lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 06 Feb 2009 16:00:05 -0500
From: iDefense Labs <labs-no-reply@...fense.com>
To: bugtraq@...urityfocus.com, vulnwatch@...nwatch.org,
	full-disclosure@...ts.grok.org.uk
Subject: iDefense Security Advisory 02.06.09: HP Network Node Manager Multiple
 Information Disclosure Vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

iDefense Security Advisory 02.06.09
http://labs.idefense.com/intelligence/vulnerabilities/
Feb 06, 2009

I. BACKGROUND

HP Network Node Manager (NNM) is an application suite that is used to
map out and manage network topography. NNM runs on a variety of
platforms, including Linux and multiple versions of Windows. For more
information, see the vendor's site found at the following link.

http://www.openview.hp.com/products/nnm/index.html

II. DESCRIPTION

Remote exploitation of multiple information disclosure vulnerabilities
in Hewlett-Packard Development Co. LP (HP)'s Network Node Manager could
allow an attacker to gain access to sensitive information.

Two vulnerabilities exist within the CGI applications distributed with
NNM.

The first vulnerability exists in the nnmRptConfig.exe CGI application.
When responding to specifically crafted requests, the CGI will disclose
the location of log directories.

The second vulnerability exists within the ovlaunch.exe CGI. If a
parameter is incorrectly set in a specific request, the application
will return various configuration details.

III. ANALYSIS

Exploitation of these vulnerabilities results in the disclosure of
sensitive information. While the direct effects of these
vulnerabilities are minimal, they may be useful to an attacker
attempting to exploit other vulnerabilities.

IV. DETECTION

iDefense has confirmed the existence of these vulnerabilities in Network
Node Manager version 7.53 for Linux and Windows. Previous versions may
also be affected.

V. WORKAROUND

iDefense is currently unaware of any workarounds for these issues.

VI. VENDOR RESPONSE

Hewlett-Packard has released a patch which addresses this issue. For
more information, consult their advisory at the following URL.

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01661610

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
name CVE-2008-4560 to this issue. This is a candidate for inclusion in
the CVE list (http://cve.mitre.org/), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

06/19/2008  Initial Contact
06/19/2008  Vendor Case # SSRT080095 set
07/10/2008  PoC sent
01/22/2009  Vendor says patch is ready
02/05/2009  Requested CVE from vendor
02/05/2009  Requested date coordination
02/06/2009  Coordinated Public Disclosure

IX. CREDIT

The discoverer of this vulnerability wishes to remain anonymous.

Get paid for vulnerability research
http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events
http://labs.idefense.com/

X. LEGAL NOTICES

Copyright © 2009 iDefense, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDefense. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically,
please e-mail customerservice@...fense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.
 There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct,
indirect, or consequential loss or damage arising from use of, or
reliance on, this information.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFJjKTTbjs6HoxIfBkRAn+nAJ0YusPTHicFnJpCKBIMwhEsg26p2wCdGZM3
12udAN07EiZpKlRihYGh0LA=
=z792
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ