what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

hpnnm750.txt

hpnnm750.txt
Posted Feb 13, 2007
Authored by 3APA3A

Hewlett-Packard Network Node Manager version 7.50 suffers from a weak file permission vulnerability.

tags | advisory
advisories | CVE-2007-0819
SHA-256 | 18e604d9ebe27727202f140e225b76db05ea8dd755422272552f40dd75b95143

hpnnm750.txt

Change Mirror Download
Title:  Hewlett-Packard  Network  Node  Manager 7.50 Remote Console weak
files permissions
Application: Hewlett-Packard Network Node Manager 7.50 Remote Console
under Microsoft Windows XP SP2.
Vulnerability: Local
Vulnerability Level: High
Impact: privilege escalation of any unprivileged user to Local System or
another user's account.
Author: 3APA3A <3APA3A@security.nnov.ru>, http://SecurityVulns.com
Advisory URL: http://securityvulns.com/advisories/nnmrc.asp
SecurityVulns news URL: http://securityvulns.com/news/HP/NNM/RC/WP.html
CVE: CVE-2007-0819

Intro:

NNM Remote Console is remote administration tool for HP Network Node
Manager (NNM). Unlike the rest of NNM, it's installed on administrator's
workstation. 7.50 is the latest version of NNM Remote Console, because
console installation can not be upgraded to 7.51.

Vulnerability Description:

The bug is very simple: insecure installation folder permissions. During
installation of HP Open View Network Node Manager Console this commands
is performed:

C:\WINDOWS\system32\cmd.exe /C CALL cacls "C:\Program Files\HP OpenView" /T /C /P Everyone:F < "C:\Program Files\HP OpenView\yes.txt" >> "C:\Program Files\HP OpenView\log\setup.log"

This command recursively changes access permissions for

C:\Program Files\HP OpenView

folder to

Everyone:Full Control.

It makes it possible for any local user to replace any of HP Open View
executable files or ActiveX components with trojaned/backdoored ones and
gain permissions of user running any of Open View applications (usually
network administrator user).

And worse: there is service installed into HP Open View folder, namely

HP Open View Shared Trace Service

with executable

C:\Program Files\HP OpenView\bin\ovtrcsvc.exe


It's executed with highest possible Local System account. It makes it
possible for any local user to overwrite service executable and obtain
Local System privileges.


Exploit:

1. Rename ovtrcsvc.exe to ovtrcsvc.old
2. Replace ovtrcsvc.exe with any application of your choice and
restart system.
3. Reboot (or wait for reboot).

Workaround:

Restore permission inheritance from parent folder for "C:\Program
Files\HP OpenView\".

Vendor:

September, 11 2006 - Vendor (security-alert@hp.com) informed
September, 11 2006 - Automated response received
September, 12 2006 - Human response received ("We will investigate this
and reply")
September, 29 2006 - Second vendor notification
September, 29 2006 - Vendor replies, patches are scheduled at the end of
October. Vendor asks for coordinated disclosure.
November, 16 2006 - Third vendor notification
November, 16 2006 - "Sorry for the delay. I have asked the division for
a schedule update. I will let you know."
February, 07 2007 - non-coordinated public disclosure.



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close