CVE-2007-6195
Hewlett-Packard HP-UX swagentd Buffer Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Buffer overflow in the sw_rpc_agent_init function in swagentd in Software Distributor (SD), and possibly other DCE applications, in HP HP-UX B.11.11 and B.11.23 allows remote attackers to execute arbitrary code or cause a denial of service via malformed arguments in an opcode 0x04 DCE RPC request.
Un desbordamiento de búfer en la función sw_rpc_agent_init en swagentd en Software Distributor (SD) y posiblemente en otras aplicaciones DCE, en HP HP-UX versiones B.11.11 y B.11.23, permite a los atacantes remotos ejecutar código arbitrario o causar una denegación de servicio por medio de argumentos malformados en una petición DCE RPC opcode 0x04.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard HP-UX operating system. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the function sw_rpc_agent_init (opcode 0x04) defined in swagentd. Specific malformed arguments can cause function pointers to be overwritten and thereby result in arbitrary code execution.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-11-30 CVE Reserved
- 2007-12-13 CVE Published
- 2024-08-07 CVE Updated
- 2024-09-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/archive/1/485260/100/0/threaded | Mailing List | |
http://www.securitytracker.com/id?1019098 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-07-079.html | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/39018 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5710 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/26855 | 2018-10-15 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/28087 | 2018-10-15 | |
http://www.vupen.com/english/advisories/2007/4220 | 2018-10-15 | |
http://www12.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01294212-1 | 2018-10-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hp Search vendor "Hp" | Hp-ux Search vendor "Hp" for product "Hp-ux" | 11.11 Search vendor "Hp" for product "Hp-ux" and version "11.11" | - |
Affected
| ||||||
Hp Search vendor "Hp" | Hp-ux Search vendor "Hp" for product "Hp-ux" | 11.23 Search vendor "Hp" for product "Hp-ux" and version "11.23" | - |
Affected
|