Secunia Security Advisory - Some vulnerabilities have been reported in HP OpenView Network Node Manager, which can be exploited by malicious people to disclose certain information or cause a DoS (Denial of Service).
5e5aa631a51051db3629b51a25d5ae7e32459260a62fce70a9e462734720eb55
----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
16 days left of beta period.
The 1st generation of the Secunia Network Software Inspector (NSI)
has been available for corporate users for almost 1 year and its been
a tremendous success.
The 2nd generation Secunia NSI is built on the same technology as the
award winning Secunia PSI, which has already been downloaded and
installed on more than 400,000 computers world wide.
Learn more / Download (instant access):
http://secunia.com/network_software_inspector_2/
----------------------------------------------------------------------
TITLE:
HP OpenView Network Node Manager Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA29796
VERIFY ADVISORY:
http://secunia.com/advisories/29796/
CRITICAL:
Less critical
IMPACT:
Exposure of system information, Exposure of sensitive information,
DoS
WHERE:
>From local network
SOFTWARE:
HP OpenView Network Node Manager (NNM) 7.x
http://secunia.com/product/3608/
DESCRIPTION:
Some vulnerabilities have been reported in HP OpenView Network Node
Manager, which can be exploited by malicious people to disclose
certain information or cause a DoS (Denial of Service).
1) An error in the ovtopmd.exe service can be exploited to cause the
service to terminate via a type 0x36 request sent to default port
2532/TCP.
2) An input validation error in the ovalarmsrv.exe service can be
exploited to cause the service to consume large amounts of CPU
resources by sending specially crafted requests (e.g. type 25, 45,
46, 47 and 81) to default port 2954/TCP.
3) A NULL-pointer dereference error within ovalarmsrv.exe can be
exploited via a specially crafted request sent to default port
2954/TCP.
4) It is possible to download or view arbitrary files by sending an
HTTP request to the OpenView5.exe CGI application and passing strings
containing directory traversal sequences to the "Action" parameter.
The vulnerabilities are reported in version 7.53. Other versions may
also be affected.
SOLUTION:
Restrict network access to the services. Filter malicious characters
and character sequences using a web proxy.
PROVIDED AND/OR DISCOVERED BY:
1-3) Luigi Auriemma
4) Independently discovered by:
* Luigi Auriemma
* JJ Reyes, Secunia Research
ORIGINAL ADVISORY:
Luigi Auriemma:
http://aluigi.altervista.org/adv/closedviewx-adv.txt
Secunia Research:
http://secunia.com/secunia_research/2008-4/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------