CVE-2011-1867
HP iNode Management Center iNodeMngChecker.exe Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in iNodeMngChecker.exe in the User Access Manager (UAM) 5.0 before SP1 E0101P03 and Endpoint Admission Defense (EAD) 5.0 before SP1 E0101P03 components in HP Intelligent Management Center (aka iNode Management Center) allows remote attackers to execute arbitrary code via a 0x0A0BF007 packet.
Desbordamiento de búfer basado en pila en iNodeMngChecker.exe en el User Access Manager (UAM ) v5.0 antes de SP1 E0101P03 y Endpoint Admission Defense(EAD )v5.0 antes de SP1 E0101P03,componentes de HP Intelligent Management Center (también conocido como iNode Management Center), permite a atacantes remotos ejecutar código de su elección a través de un paquete 0x0A0BF007.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP H3C/3Com iNode Management Center. Authentication is not required to exploit this vulnerability.
The flaw exists within the iNOdeMngChecker.exe component which listens by default on TCP port 9090. When handling the 0x0A0BF007 packet type the process blindly copies user supplied data into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-05-03 CVE Reserved
- 2011-07-01 CVE Published
- 2024-02-29 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/8302 | Third Party Advisory | |
http://securitytracker.com/id?1025740 | Vdb Entry | |
http://www.osvdb.org/73597 | Vdb Entry | |
http://www.securityfocus.com/archive/1/518691/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/48527 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-11-232 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68348 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://marc.info/?l=bugtraq&m=130982758604404&w=2 | 2018-10-09 | |
http://secunia.com/advisories/45129 | 2018-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hp Search vendor "Hp" | Endpoint Admission Defense Search vendor "Hp" for product "Endpoint Admission Defense" | 5.0 Search vendor "Hp" for product "Endpoint Admission Defense" and version "5.0" | - |
Affected
| ||||||
Hp Search vendor "Hp" | Endpoint Admission Defense Search vendor "Hp" for product "Endpoint Admission Defense" | 5.0 Search vendor "Hp" for product "Endpoint Admission Defense" and version "5.0" | e0101 |
Affected
| ||||||
Hp Search vendor "Hp" | Intelligent Management Center Search vendor "Hp" for product "Intelligent Management Center" | * | - |
Affected
| ||||||
Hp Search vendor "Hp" | User Access Manager Search vendor "Hp" for product "User Access Manager" | 5.0 Search vendor "Hp" for product "User Access Manager" and version "5.0" | - |
Affected
| ||||||
Hp Search vendor "Hp" | User Access Manager Search vendor "Hp" for product "User Access Manager" | 5.0 Search vendor "Hp" for product "User Access Manager" and version "5.0" | e0101 |
Affected
|