Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Try our Premium Alert Service
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service

Category:   Application (Generic)  >   HPE OpenView Network Node Manager Vendors:   HPE
HP OpenView Network Node Manager Buffer Overflows Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1021521
SecurityTracker URL:
CVE Reference:   CVE-2008-0067   (Links to External Site)
Updated:  May 5 2010
Original Entry Date:  Jan 7 2009
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.01, 7.51, 7.53
Description:   Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

A remote user can send a specially crafted HTTP request to trigger a buffer overflow and execute arbitrary code on the target system. The code will run with the privileges of the target service.

OpenView5.exe, ov.dll, getcvdata.exe, ovlaunch.exe, and Toolbar.exe are affected.

The vendor was notified on January 7, 2008.

The original advisory is available at:

JJ Reyes of Secunia Research reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix.

For OV NNM v7.53:

HP-UX (IA) PHSS_38489 or subsequent
HP-UX (PA) PHSS_38488 or subsequent
Linux RedHatAS2.1 LXOV_00087 or subsequent
Linux RedHat4AS-x86_64 LXOV_00088 or subsequent
Solaris PSOV_03515 or subsequent
Windows NNM_01193 or subsequent

For OV NNM v7.51, upgrade to NNM v7.53 and install the patches listed above.

For OV NNM v7.01 (IA), upgrade to NNM v7.53 and install the patches listed above.

For OV NNM v7.01:

HP-UX (PA) PHSS_38761 or subsequent
Solaris PSOV_03516 or subsequent
Windows NNM_01194 or subsequent

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, LLC