Print | Rate this content

HPSBMA02621 SSRT100352 rev.2 - HP OpenView Network Node Manager (OV NNM), Remote Execution of Arbitrary Code

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02670501

Version: 2

HPSBMA02621 SSRT100352 rev.2 - HP OpenView Network Node Manager (OV NNM), Remote Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2011-01-10

Last Updated: 2011-01-12


Potential Security Impact: Remote execution of arbitrary code

Source: Hewlett Packard Enterprise, HPE Product Security Response Team

VULNERABILITY SUMMARY

Potential security vulnerabilities have been identified with HP OpenView Network Node Manager (OV NNM). The vulnerabilities could be exploited remotely to execute arbitrary code under the context of the user running the web server.

References:
CVE-2011-0261 (ZDI-CAN-753)
CVE-2011-0262 (ZDI-CAN-757)
CVE-2011-0263 (ZDI-CAN-774)
CVE-2011-0264 (ZDI-CAN-810)
CVE-2011-0265 (ZDI-CAN-931)
CVE-2011-0266 (ZDI-CAN-932)
CVE-2011-0267 (ZDI-CAN-933)
CVE-2011-0268 (ZDI-CAN-934)
CVE-2011-0269 (ZDI-CAN-935)
CVE-2011-0270 (ZDI-CAN-936)
CVE-2011-0271 (iDefense)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows

BACKGROUND

CVSS 2.0 Base Metrics

Reference
Base Vector
Base Score
CVE-2011-0261
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
10
CVE-2011-0262
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
10
CVE-2011-0263
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
10
CVE-2011-0264
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
10
CVE-2011-0265
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
10
CVE-2011-0266
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
10
CVE-2011-0267
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
10
CVE-2011-0268
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
10
CVE-2011-0269
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
10
CVE-2011-0270
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
10
CVE-2011-0271
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
10

Information on CVSS is documented in HP Customer Notice: HPSN-2008-002.

The Hewlett-Packard Company thanks Aniway.Anyway@gmail.com along with TippingPoint's Zero Day Initiative for reporting ZDI-CAN-931, ZDI-CAN-932, ZDI-CAN-933, ZDI-CAN-934, ZDI-CAN-935, and ZDI-CAN-936 to security-alert@hp.com.

The Hewlett-Packard Company thanks SilentSignal along with TippingPoint's Zero Day Initiative for reporting ZDI-CAN-774 and ZDI-CAN-810 to security-alert@hp.com.

The Hewlett-Packard Company thanks an anonymous researcher along with TippingPoint's Zero Day Initiative for reporting ZDI-CAN-753 and ZDI-CAN-757 to security-alert@hp.com.

The Hewlett-Packard Company thanks an anonymous researcher working with the iDefense VCP for reporting CVE-2011-0271 to security-alert@hp.com.

RESOLUTION

HP has made patches available to resolve the vulnerabilities for NNM v7.53.

OV NNM v7.53

The patches are available from http://support.openview.hp.com/selfsolve/patches

Operating System
Patch
HP-UX (IA)
PHSS_41607 or subsequent
HP-UX (PA)
PHSS_41606 or subsequent
Linux RedHatAS2.1
LXOV_00113 or subsequent
Linux RedHat4AS-x86_64
LXOV_00114 or subsequent
Solaris
PSOV_03531 or subsequent
Windows
NNM_01208 or subsequent

OV NNM v7.51
Upgrade to NNM v7.53 and apply the NNM v7.53 resolution listed above.
Patch bundles for upgrading from NNM v7.51 to NNM v7.53 are available using ftp:

Host
Account
Password
ftp.usa.hp.com
nnm_753
Update53

MANUAL ACTIONS: No

PRODUCT SPECIFIC INFORMATION

HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa

The following text is for use by the HP-UX Software Assistant.

AFFECTED VERSIONS (for HP-UX)

For HP-UX OV NNM 7.51 and 7.53
HP-UX B.11.31
HP-UX B.11.23 (IA)
HP-UX B.11.23 (PA)
HP-UX B.11.11
=============
OVNNMgr.OVNNM-RUN,fr=B.07.50.00
action: install the patch listed in the Resolution

END AFFECTED VERSIONS (for HP-UX)

HISTORY
Version:1 (rev.1) - 10 January 2011 Initial release
Version:2 (rev.2) - 12 January 2011 Corrected CVE numbers

Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.

©Copyright 2018 Hewlett Packard Enterprise Development LP
Hewlett Packard Enterprise Development shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HPE nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise Development and the names of Hewlett Packard Enterprise Development products referenced herein are trademarks of Hewlett Packard Enterprise Development in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

Legal Disclaimer: Products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models.

Provide feedback

Please rate the information on this page to help us improve our content. Thank you!
Document title: HPSBMA02621 SSRT100352 rev.2 - HP OpenView Network Node Manager (OV NNM), Remote Execution of Arbitrary Code
Document ID: emr_na-c02670501-2
How helpful was this document?
How can we improve this document?
Note: Only English language comments can be accepted at this time.
Please wait while we process your request.