![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.100786 |
Categoría: | Web application abuses |
Título: | HP OpenView Network Node Manager 'execvp_nc()' Code Execution Vulnerability |
Resumen: | HP OpenView Network Node Manager (OV NNM) is prone to a remote; code-execution vulnerability. |
Descripción: | Summary: HP OpenView Network Node Manager (OV NNM) is prone to a remote code-execution vulnerability. Vulnerability Impact: An attacker can exploit this issue to execute arbitrary code with SYSTEM- level privileges. Successful exploits will completely compromise affected computers. Affected Software/OS: The issue affects HP OpenView Network Node Manager versions 7.51 and 7.53 running on the Windows platform. Solution: Updates are available. Please see the references for details. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-2703 BugTraq ID: 41829 http://www.securityfocus.com/bid/41829 Bugtraq: 20100721 VUPEN Security Research - HP OpenView Network Node Manager "ov.dll" Buffer Overflow Vulnerability (CVE-2010-2704) (Google Search) http://www.securityfocus.com/archive/1/512544/100/0/threaded Bugtraq: 20100721 ZDI-10-137: Hewlett-Packard OpenView NNM webappmon.exe execvp_nc Remote Code Execution Vulnerability (Google Search) http://www.securityfocus.com/archive/1/512552/100/0/threaded http://www.exploit-db.com/exploits/14916 HPdes Security Advisory: HPSBMA02557 http://marc.info/?l=bugtraq&m=127973001009749&w=2 HPdes Security Advisory: SSRT100025 http://osvdb.org/66514 http://www.securitytracker.com/id?1024224 http://www.securitytracker.com/id?1024238 http://secunia.com/advisories/40686 http://securityreason.com/securityalert/8161 http://www.attrition.org/pipermail/vim/2010-July/002374.html http://www.vupen.com/english/advisories/2010/1866 |
Copyright | Copyright (C) 2010 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |