A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the OvWebHelp.exe CGI application. During a string concatenation the process takes the value of the Topic POST variable and copies it without any length checks into a static 0x400 byte heap buffer. By providing a large enough string this buffer can be overrun leading to arbitrary code execution.
bc3a170b7c023d93cce2e71f5f18aae14f58b419c61aa33eea31e2d81a8e8cdf
TPTI-09-11: HP OpenView NNM OvWebHelp.exe CGI Topic Heap Overflow Vulnerability
http://dvlabs.tippingpoint.com/advisory/TPTI-09-11
December 9, 2009
-- CVE ID:
CVE-2009-4178
-- Affected Vendors:
Hewlett-Packard
-- Affected Products:
Hewlett-Packard OpenView Network Node Manager
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 8354.
For further product information on the TippingPoint IPS, visit:
http://www.tippingpoint.com
-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Hewlett-Packard OpenView Network Node
Manager. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the OvWebHelp.exe CGI application.
During a string concatenation the process takes the value of the Topic
POST variable and copies it without any length checks into a static
0x400 byte heap buffer. By providing a large enough string this buffer
can be overrun leading to arbitrary code execution.
-- Vendor Response:
Hewlett-Packard has issued an update to correct this vulnerability. More
details can be found at:
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01950877
-- Disclosure Timeline:
2009-07-20 - Vulnerability reported to vendor
2009-12-09 - Coordinated public release of advisory
-- Credit:
This vulnerability was discovered by:
* Aaron Portnoy, TippingPoint DVLabs