This Metasploit module exploits a buffer overflow in HP OpenView Network Node Manager 7.50/7.53. By sending specially crafted ICount parameter to the getnnmdata.exe CGI, an attacker may be able to execute arbitrary code.
4c22f86bdf3b46260576ea5cf66c91a1e70361023d657dd8cabdade506e19c3c
The getnnmdata.exe CGI in HP OpenView NNM suffers from an invalid icount remote code execution vulnerability.
a571b3f43d5b54967615a025bbfff4b53fd0146fac0bf7d8b77afd569ade2144
Zero Day Initiative Advisory 10-085 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getnnmdata.exe CGI. If this CGI is requested with an invalid iCount POST parameter a sprintf() call is made to log the error. However, no length check is performed on the variable contents before copying in to a fixed-length stack buffer. This can be leveraged by remote attackers to execute arbitrary code under the context of the webserver process.
8015452f65440290ba654f55ca908345c85c47a32758be472efab3338115e75c
HP Security Bulletin - Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). These vulnerabilities could be exploited remotely to execute arbitrary code.
b8679c50a8aa94d63d460ccd120eae4f0fa1767849203be1affb0687ac3f1934