This Metasploit module exploits a stack-based buffer overflow in the Hewlett-Packard OmniInet NT Service. By sending a specially crafted MSG_PROTOCOL (0x010b) packet, a remote attacker may be able to execute arbitrary code with elevated privileges. This service is installed with HP OpenView Data Protector, HP Application Recovery Manager and potentially other products. This exploit has been tested against versions 6.1, 6.0, and 5.50 of Data Protector. and versions 6.0 and 6.1 of Application Recovery Manager. NOTE: There are actually two consecutive wcscpy() calls in the program (which may be why ZDI considered them two separate issues). However, this module only exploits the second one.
6077abc4561b8bb88f893fcbc753edd3a1b15ac32e3ac4ebcdc7446ce7360c3c
This Metasploit module exploits a stack-based buffer overflow in HP Application Recovery Manager OmniInet daemon. By sending a specially crafted MSG_PROTOCOL packet, a remote attacker may be able to execute arbitrary code.
bb3140caff7cdc64edf4b36ae5ea23db6db25dcb500491fe2b403cad680d6697
Zero Day Initiative Advisory 09-091 - This vulnerability allows remote attackers to execute arbitrary code on vulnerability installations of HP Application Recovery Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists in the handling of requests to the OmniInet process listening by default on TCP port 5555. The OmniInet process uses a custom protocol for handling requests. When handling MSG_PROTOCOL (0x010b) packets arbitrary user supplied data is copied to the stack without proper bounds checking. Successful exploitation of this vulnerability can lead to remote code execution under the SYSTEM context.
c91eea10325dd73f5d29148d40da67751e4d3a05b137239098bfa7cfbcd90b9c
HP Security Bulletin - A potential security vulnerability has been identified with OpenView Data Protector Application Recovery Manager version 5.5 and 6.0. The vulnerability could be exploited remotely to create a denial of service (DoS).
650f198c7b6029babfaadd97157fd8150b7be565b6436b84c888e6f6757ff5bf