SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   HPE OpenView Radia Vendors:   HPE
HP OpenView Radia Management Portal Lets Remote Users Gain Access and Also Deny Service
SecurityTracker Alert ID:  1013829
SecurityTracker URL:  http://securitytracker.com/id/1013829
CVE Reference:   CAN-2005-1370   (Links to External Site)
Updated:  Jul 28 2005
Original Entry Date:  Apr 28 2005
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.x, 2.x
Description:   A vulnerability was reported in HP OpenView Radia Management Portal. A remote user can gain access and can cause denial of service conditions.

The Radia Management Agent contains flaw that allows a remote user to gain privileged access by executing arbitrary commands. A remote user can connect to the service and send a specially crafted packet to escape the working directory ('C:\Program Files\Novadigm'), traverse the directory, and run any executable on the same disk drive.

A demonstration exploit command is provided:

\x00\x00\x00../../windows/system32/whoami.exe\x00

On Windows-based systems, the executable will generally run with Local System privileges.

A remote user can also deny service.

The vendor credits Dominic Beecher and David Morgan of NGSSoftware Ltd with reporting this vulnerabiltiy.

Impact:   A remote user can execute arbitrary executables on the target system.

A remote user can also deny service.

Solution:   The vendor has issued a fix.

For version 2.x, use patch RADINFRAWIN32_00005, available from HP Software Support Online at:

http://support.openview.hp.com

For version 1.x, contact the Radia Support Team for the following patches:

RADINFRAWIN32_00006 Windows
RADINFRAAIX_00002 AIX
RADINFRAHPUX1_00003 HP-UX
RADINFRALNX_00001 Linux
RADINFRASOL_00002 Solaris

Vendor URL:  www.hp.com/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (NT), Windows (2000), Windows (2003), Windows (XP)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC