SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   HPE IT Executive Scorecard Vendors:   HPE
HP IT Executive Scorecard Bugs Let Remote Users Traverse the Directory and Execute Arbitrary Code
SecurityTracker Alert ID:  1030439
SecurityTracker URL:  http://securitytracker.com/id/1030439
CVE Reference:   CVE-2014-2609, CVE-2014-2610, CVE-2014-2611   (Links to External Site)
Date:  Jun 18 2014
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9.40, 9.41
Description:   Several vulnerabilities were reported in HP IT Executive Scorecard. A remote user can execute arbitrary code on the target system. A remote user can traverse the directory on the target system.

No details were provided.

The vendor was notified on January 30 and 31, 2014.

The vendor has assigned SSRT101431, SSRT101435, and SSRT101436 to these vulnerabilities.

Mike Arnold (Bruk0ut) reported these vulnerabilities via HP's Zero Day Initiative.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can traverse the directory on the target system.

Solution:   The vendor has issued a fix (9.40 0001patch, 9.41 0001patch).

The vendor's advisory is available at:

http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04341295-1

Vendor URL:  h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04341295-1 (Links to External Site)
Cause:   Not specified

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC