Multiple stack-based buffer overflows in the inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allow remote attackers to execute arbitrary code via a request containing crafted parameters.
Published 2011-07-01 10:55:02
Updated 2017-08-17 01:34:27
Source HP Inc.
View at NVD,   CVE.org
Vulnerability category: OverflowExecute code

Products affected by CVE-2011-1865

Exploit prediction scoring system (EPSS) score for CVE-2011-1865

94.71%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2011-1865

  • HP OmniInet.exe Opcode 27 Buffer Overflow
    Disclosure Date: 2011-06-29
    First seen: 2020-04-26
    exploit/windows/misc/hp_omniinet_3
    This module exploits a buffer overflow in the Hewlett-Packard OmniInet NT Service. By sending a specially crafted opcode 27 packet, a remote attacker may be able to execute arbitrary code. Authors: - MC <mc@metasploit.com>
  • HP OmniInet.exe Opcode 20 Buffer Overflow
    Disclosure Date: 2011-06-29
    First seen: 2020-04-26
    exploit/windows/misc/hp_omniinet_4
    This module exploits a vulnerability found in HP Data Protector's OmniInet process. By supplying a long string of data as the file path with opcode '20', a buffer overflow can occur when this data is being written on the stack where no proper bounds checking is do

CVSS scores for CVE-2011-1865

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
10.0
HIGH AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
NIST

CWE ids for CVE-2011-1865

  • The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
    Assigned by: nvd@nist.gov (Primary)

References for CVE-2011-1865

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!