This Metasploit module exploits a stack overflow in Hewlett-Packard Power Manager 4.2. Sending a specially crafted POST request with an overly long Login string, an attacker may be able to execute arbitrary code.
760a5e0c428e0ee8a5ed03674f016766c57a65eb426311bb765728b2278567af
HP Power Manager Administration universal buffer overflow exploit. Written in Python.
337fad58366611acfcbe84f9d94f843b5856b4b86a3e3ea9b0faf759454d90c4
Zero Day Initiative Advisory 09-081 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Power Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists in the handling of URL parameters when posting to the login form of the web based management web server. Proper bounds checking is not applied when parsing the Login variable which can result in an exploitable stack overflow. Successful exploitation can lead to complete system compromise under the SYSTEM credentials.
4fe2c6ee8f4ae0da2ae82442b72be82eb4f7a98c1b56f5d96838548dde5e5b48
HP Security Bulletin - A potential security vulnerability has been identified with HP Power Manager. The vulnerability could be exploited remotely to execute arbitrary code.
53080e1e2988e928bf4696c49f0cd570649bd4259d541307bb5c18f3d7d7a8c9