HP OpenView Network Node Manager command execution

hp-openview-nnm-command-execution (26636) The risk level is classified as HighHigh Risk

Description:

Multiple unspecified vulnerabilities in HP OpenView Network Node Manager (OV NNM) could allow a remote attacker to execute arbitrary commands, gain unauthorized access or create or overwrite arbitrary files on the system.


Consequences:

Gain Access

Remedy:

Apply the appropriate patch for your system, as listed in HPSBMA02098 SSRT5911. See References.

References:

  • BugTraq Mailing List, Tue May 23 2006 - 07:40:29 CDT: [security bulletin] HPSBMA02098 SSRT5911 rev.1 - HP OpenView Network Node Manager (OV NNM) Remote Unauthorized Privileged Access, Arbitrary Command Execution, Arbitrary File Creation.
  • HP Security Bulletin HPSBMA02098 SSRT5911: HP OpenView Network Node Manager (OV NNM) Remote Unauthorized Privileged Access, Arbitrary Command Execution, Arbitrary File Creation.
  • BID-18096: HP OpenView Network Node Manager Multiple Remote Vulnerabilities
  • CVE-2006-2580: Multiple unspecified vulnerabilities in HP OpenView Network Node Manager (OV NNM) 6.20, 6.4x, 7.01, and 7.50 allow remote attackers to gain privileged access, execute arbitrary commands, or create arbitrary files via unknown vectors.
  • OSVDB ID: 25898: HP OpenView Network Node Manager (OV NNM) Unspecified Privileged Command Execution
  • SA20193: HP OpenView Network Node Manager Arbitrary Command Execution
  • SECTRACK ID: 1016137: HP OpenView Network Node Manager Lets Remote Users Execute Arbitrary Commands, Create Arbitrary Files, and Access the System

Platforms Affected:

  • HP HP-UX B.11.00
  • HP HP-UX B.11.11
  • HP HP-UX B.11.23
  • HP OpenView Network Node Manager 6.20
  • HP OpenView Network Node Manager 6.4
  • HP OpenView Network Node Manager 7.01
  • HP OpenView Network Node Manager 7.50

Reported:

May 22, 2006

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page