CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2010-2703 (1 public exploit)

Stack-based buffer overflow in the execvp_nc function in the ov.dll module in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53, when running on Windows, allows remote attackers to execute arbitrary code via a long HTTP request to webappmon.exe.
Publish Date : 2010-07-28 Last Update Date : 2018-10-10
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
10.0
Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)
Integrity Impact Complete (There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)
Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)
Access Complexity Low (Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. )
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access None
Vulnerability Type(s) Execute CodeOverflow
CWE ID 119

- Products Affected By CVE-2010-2703

# Product Type Vendor Product Version Update Edition Language
1 Application HP Openview Network Node Manager 7.51 - Windows Version Details Vulnerabilities
2 Application HP Openview Network Node Manager 7.53 - Windows Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
HP Openview Network Node Manager 2

- References For CVE-2010-2703

http://www.vupen.com/english/advisories/2010/1866
VUPEN ADV-2010-1866
http://www.securitytracker.com/id?1024238
SECTRACK 1024238
http://www.securitytracker.com/id?1024224
SECTRACK 1024224
Exploit! http://www.exploit-db.com/exploits/14916
EXPLOIT-DB 14916 HP OpenView NNM - webappmon.exe execvp_nc Remote Code Execution Author:Abysssec Release Date:2010-09-06 (windows) dos
http://www.securityfocus.com/archive/1/512544/100/0/threaded
BUGTRAQ 20100721 VUPEN Security Research - HP OpenView Network Node Manager "ov.dll" Buffer Overflow Vulnerability (CVE-2010-2704)
http://www.securityfocus.com/archive/1/512552/100/0/threaded
BUGTRAQ 20100721 ZDI-10-137: Hewlett-Packard OpenView NNM webappmon.exe execvp_nc Remote Code Execution Vulnerability
http://securityreason.com/securityalert/8161
SREASON 8161
http://www.securityfocus.com/bid/41829
BID 41829 HP OpenView Network Node Manager 'execvp_nc()' Code Execution Vulnerability Release Date:2010-09-06
http://www.attrition.org/pipermail/vim/2010-July/002374.html
VIM 20100727 CVE number confusion in HP OV NNM products
http://marc.info/?l=bugtraq&m=127973001009749&w=2
HP HPSBMA02557

- Vulnerability Conditions

Vulnerability is valid if product versions listed below are used TOGETHER WITH(AND)

- Metasploit Modules Related To CVE-2010-2703

HP OpenView Network Node Manager execvp_nc Buffer Overflow
This module exploits a stack buffer overflow in HP OpenView Network Node Manager 7.53 prior to NNM_01207 or NNM_01206 without the SSRT100025 hotfix. By specifying a long 'sel' parameter when calling methods within the 'webappmon.exe' CGI program, an attacker can cause a stack-based buffer overflow and execute arbitrary code. This vulnerability is not triggerable via a GET request due to limitations on the request size. The buffer being targeted is 16384 bytes in size. There are actually two adjacent buffers that both get overflowed (one into the other), and strcat is used. The vulnerable code is within the "execvp_nc" function within "ov.dll" prior to v 1.30.12.69. There are no stack cookies, so exploitation is easily achieved by overwriting the saved return address or SEH frame. This vulnerability might also be triggerable via other CGI programs, however this was not fully investigated.
Module type : exploit Rank : great Platforms : Windows


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.