SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   HPE Intelligent Management Center Vendors:   HPE
HPE Intelligent Management Center PLAT Unspecified Flaws Let Remote Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1038478
SecurityTracker URL:  http://securitytracker.com/id/1038478
CVE Reference:   CVE-2017-5816, CVE-2017-5817, CVE-2017-5818, CVE-2017-5819, CVE-2017-8956   (Links to External Site)
Updated:  Jul 25 2017
Original Entry Date:  May 15 2017
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in HPE Intelligent Management Center (iMC) PLAT. A remote user can execute arbitrary code on the target system.

No details were provided.

sztivi (via Trend Micro's Zero Day Initiative) reported one vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   HPE has issued a fix (7.3 E0504P04).

The HPE advisory is available at:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us

Vendor URL:  h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Red Hat Enterprise), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 12 2017 (HPE Issues Fix for HPE Network Node Manager i) HPE Intelligent Management Center PLAT Unspecified Flaws Let Remote Users Execute Arbitrary Code on the Target System
HPE has issued a fix for HPE Network Node Manager i.



 Source Message Contents

Subject:  https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC