The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of HPE OpenView Operations

vulnerability announce CVE-2012-3258

HP Operations Orchestration: code execution via RSScheduler

Synthesis of the vulnerability

An unauthenticated attacker can inject commands in the JDBC component of the RSScheduler service of HP Operations Orchestration, in order to execute code with system privileges.
Impacted products: OpenView, OpenView Operations, HP Operations.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: intranet client.
Creation date: 29/08/2012.
Identifiers: BID-55270, BID-55594, c03490339, CVE-2012-3258, HPSBMU02813, SSRT100712, VIGILANCE-VUL-11902, ZDI-12-172.

Description of the vulnerability

The JDBC component of the RSScheduler service of HP Operations Orchestration listens by default on port 9001/tcp.

However, an attacker can inject SQL data via JDBC. These data are then executed with privileges of the SYSTEM user.

An unauthenticated attacker can therefore inject commands in the JDBC component of the RSScheduler service of HP Operations Orchestration, in order to execute code with system privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2012-2019 CVE-2012-2020

HP Operations Agent, Performance Agent: code execution

Synthesis of the vulnerability

A remote attacker can use two vulnerabilities of HP Operations Agent and HP Performance Agent, in order to execute code.
Impacted products: OpenView, OpenView Operations, HP Operations, Performance Center.
Severity: 3/4.
Consequences: privileged access/rights.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 10/07/2012.
Revisions dates: 13/07/2012, 23/07/2012.
Identifiers: BID-54362, c03397769, CERTA-2012-AVI-374, CVE-2012-2019, CVE-2012-2020, HPSBMU02796, SSRT100594, SSRT100595, VIGILANCE-VUL-11749, ZDI-12-114, ZDI-12-115, ZDI-CAN-1325, ZDI-CAN-1326.

Description of the vulnerability

Two vulnerabilities were announced in HP Operations Agent and HP Performance Agent.

An unauthenticated attacker can use a GET query with a parameter with a large integer value for Opcode 0x34, in order to generate a buffer overflow in coda.exe. [severity:3/4; CVE-2012-2019, SSRT100594, ZDI-12-114, ZDI-CAN-1325]

An unauthenticated attacker can use a GET query with a parameter with a large integer value for Opcode 0x8C, in order to generate a buffer overflow in coda.exe. [severity:3/4; CVE-2012-2020, SSRT100595, ZDI-12-115, ZDI-CAN-1326]

A remote attacker can therefore use two vulnerabilities of HP Operations/Performance Agent, in order to execute code.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2011-4160

HP Operations Agent, Performance Agent: access to a directory

Synthesis of the vulnerability

A local attacker can use a vulnerability of HP Operations Agent and Performance Agent on Unix, in order to access to a directory.
Impacted products: OpenView, OpenView Operations, HP Operations, Performance Center.
Severity: 2/4.
Consequences: data reading, data creation/edition, data deletion.
Provenance: user shell.
Creation date: 22/11/2011.
Identifiers: BID-50761, c03091656, CVE-2011-4160, HPSBMU02726, SSRT100685, VIGILANCE-VUL-11173.

Description of the vulnerability

The HP Operations Agent and Performance Agent products can be installed on Unix.

A local attacker can use a vulnerability of HP Operations Agent and Performance Agent on Unix, in order to access to a directory.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2009-3087 CVE-2009-3094 CVE-2009-3095

Several products: several vulnerabilities

Synthesis of the vulnerability

Several vulnerabilities were announced in numerous products.
Impacted products: Apache httpd, OpenOffice, NetWorker, F-PROT AV, FreeBSD, OpenView, OpenView NNM, OpenView Operations, HP Operations, Domino, Kaspersky AV, MySQL Community, MySQL Enterprise, OpenSolaris, OpenSSL, Oracle AS, Oracle Directory Server, Oracle iPlanet Web Proxy Server, Oracle iPlanet Web Server, Solaris, WebLogic, Percona Server, Samba, Crystal Reports, SAP ERP, NetWeaver, Unix (platform) ~ not comprehensive.
Severity: 1/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading, data creation/edition, data deletion, denial of service on server, denial of service on service.
Provenance: internet client.
Number of vulnerabilities in this bulletin: 23.
Creation date: 04/09/2009.
Revisions dates: 11/09/2009, 26/10/2009.
Identifiers: BID-36242, BID-36243, BID-36248, BID-36250, BID-36252, BID-36253, BID-36254, BID-36257, BID-36258, BID-36263, BID-36267, BID-36285, BID-36286, BID-36813, BID-36818, BID-36819, BID-37640, CERTA-2009-AVI-384, CERTA-2009-AVI-424, CVE-2009-3087, CVE-2009-3094, CVE-2009-3095, CVE-2009-3098, CVE-2009-3099, CVE-2009-3111, CVE-2009-3344, CVE-2009-3345, CVE-2009-3346, CVE-2009-3569, CVE-2009-3570, CVE-2009-3571, CVE-2009-3878, CVE-2009-4481-REJECT, CVE-2009-4484, VIGILANCE-VUL-9000.

Description of the vulnerability

Several vulnerabilities were announced in numerous products. Their technical details are unknown. Individual bulletins will be created when details will be published.

Apache mod_proxy_ftp is impacted by two vulnerabilities: VIGILANCE-VUL-8994 and VIGILANCE-VUL-9038. [severity:1/4; BID-36254, CERTA-2009-AVI-424, CVE-2009-3094, CVE-2009-3095]

EMC Legato NetWorker is impacted by three vulnerabilities. [severity:1/4]

F-PROT Antivirus is impacted by two vulnerabilities. [severity:1/4]

FreeBSD is impacted by two vulnerabilities. [severity:1/4]

FreeRADIUS is impacted by the VIGILANCE-VUL-9016 vulnerability. [severity:1/4; BID-36263, CERTA-2009-AVI-384, CVE-2009-3111, CVE-2009-4481-REJECT]

HP Operations is impacted by two vulnerabilities. [severity:1/4; BID-36253, BID-36258, CVE-2009-3098, CVE-2009-3099]

HP OpenView Network Node Manager is impacted by four vulnerabilities. [severity:1/4; BID-36248]

Lotus Domino is impacted by six vulnerabilities. [severity:1/4; BID-36257, CVE-2009-3087]

Kaspersky Online Antivirus Scanner is impacted by two vulnerabilities. One vulnerability is related to kos-bin-winnt.jar containing the kosglue-7.0.26.0.dll DLL which can contain a Trojan Horse. [severity:1/4; BID-36243]

MySQL is impacted by two vulnerabilities. The first one is VIGILANCE-VUL-9380. [severity:1/4; BID-36242, BID-37640, CVE-2009-4484]

OpenOffice is impacted by three vulnerabilities. [severity:1/4; BID-36285, CVE-2009-3569, CVE-2009-3570, CVE-2009-3571]

OpenSSL is impacted by one vulnerability. [severity:1/4]

Oracle WebLogic is impacted by three vulnerabilities. [severity:1/4]

Oracle Application Server is impacted by five vulnerabilities. [severity:1/4]

PowerArchiver is impacted by one vulnerability. [severity:1/4]

SAP Crystal Reports is impacted by three vulnerabilities. [severity:1/4; BID-36267, CVE-2009-3344, CVE-2009-3345, CVE-2009-3346]

SAP NetWeaver is impacted by six vulnerabilities. [severity:1/4; BID-36252]

Samba is impacted by six vulnerabilities. [severity:1/4; BID-36250]

Sun Java System Directory Server is impacted by two vulnerabilities. [severity:1/4; BID-36286]

Sun Java System Web Proxy Server is impacted by one vulnerability. [severity:1/4]

Solaris is impacted by one vulnerability. [severity:1/4]

Sun Java System WebServer is impacted by one vulnerability. [severity:1/4; BID-36813, CVE-2009-3878]

Solaris is impacted by two vulnerabilities. [severity:1/4; BID-36818, BID-36819]
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2007-3922

JRE, JDK, SDK: connection to a local port

Synthesis of the vulnerability

A Java applet can connect to a local port of victim's computer.
Impacted products: OpenView, OpenView Operations, openSUSE, Java Oracle, RHEL, Slackware, SLES.
Severity: 2/4.
Consequences: data reading.
Provenance: document.
Creation date: 19/07/2007.
Revision date: 30/10/2007.
Identifiers: 102934, 102958, 102995, 6483556, 6483560, 6490790, BID-25054, c01269450, CERTA-2007-AVI-349, CVE-2007-3922, HPSBMA02288, NGS00443, RHSA-2007:0818-01, RHSA-2007:0829-01, RHSA-2008:0133-01, SSA:2007-243-01, SSRT071465, SUSE-SA:2007:056, VIGILANCE-VUL-7020.

Description of the vulnerability

The APPLET tag permit to insert a Java applet in a HTML page. For example:
  <APPLET codebase="http://internet-server/dir" code="name.class">
The "codebase" attribute indicates the name of directory containing the applet.

An Java applet coming from internet cannot normally access to resources of computer. However, if the codebase attribute starts by "verbatim:", the applet is loaded from the internet server, but the Java plugin thinks it is local.

This applet can thus connect to local ports of victim's computer.

An attacker can therefore obtain information or exploit a vulnerability of these services.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2007-1676 CVE-2007-3872

HP OpenView: several buffer overflows of OVTrace

Synthesis of the vulnerability

Several buffer overflow permit a network attacker to execute code on Hewlett-Packard OpenView via OVTrace.
Impacted products: HPE NMC, OpenView, OpenView NNM, OpenView Operations.
Severity: 3/4.
Consequences: administrator access/rights.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 10/08/2007.
Revision date: 16/08/2007.
Identifiers: BID-25255, c01106515, c01109171, c01109584, c01109617, c01110576, c01110627, c01111851, c01112038, c01114023, c01114156, c01115068, CVE-2007-1676, CVE-2007-3872, HPSBMA02235, HPSBMA02236, HPSBMA02237, HPSBMA02238, HPSBMA02239, HPSBMA02240, HPSBMA02241, HPSBMA02242, HPSBMA02244, HPSBMA02245, HPSBMA02246, SSRT061260, TPTI-07-14, VIGILANCE-VUL-7077.

Description of the vulnerability

The OVTrace service is started by default to log actions of other components of HP OpenView. It listens on 5051/tcp (OVTrace.exe) or 5053/tcp (ovtrcsvc.exe) ports.

However, this service does not correctly check size of data it receives.

An unauthenticated attacker can therefore generate several overflows in order to execute code on computer.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2007-3698

JDK, JRE, SDK: denial of service of JSSE

Synthesis of the vulnerability

An attacker can connect to SSL services created with JSSE in order to generate a denial of service.
Impacted products: HPE NMC, OpenView, OpenView NNM, OpenView Operations, NLD, OES, Java Oracle, RHEL, SLES.
Severity: 2/4.
Consequences: denial of service on service.
Provenance: intranet client.
Creation date: 12/07/2007.
Identifiers: 102934, 102958, 102997, 6483556, 6483560, 6490790, 6542796, BID-24846, c01269450, c01601492, CVE-2007-3698, HPSBMA02288, HPSBMA02384, RHSA-2007:0956-01, RHSA-2007:1086-01, RHSA-2008:0100-01, RHSA-2008:0132-01, SSRT071465, SUSE-SA:2008:025, VIGILANCE-VUL-6999.

Description of the vulnerability

The JSSE extension (Java Secure Socket Extension) permits to create SSL/TLS services.

However, JSSE does not correctly handle the handshake, which leads to an overload of processor.

An attacker can therefore connect to a SSL/TLS service provided by JSSE in order to generate a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability 4485

Obtention de privilèges élevés avec HP OpenView Operations

Synthesis of the vulnerability

Un attaquant distant peut accéder à HP OpenView Operations.
Impacted products: OpenView, OpenView Operations, HP-UX, Solaris, Trusted Solaris.
Severity: 3/4.
Consequences: administrator access/rights.
Provenance: intranet client.
Creation date: 02/11/2004.
Identifiers: BID-11576, HP01092, V6-HPOVOREMPRIV, VIGILANCE-VUL-4485.

Description of the vulnerability

Le produit HP OpenView Operations permet de gérer un système à distance.

Une vulnérabilité de OpenView Operations permet à un attaquant distant d'obtenir des droits élevés sur les machines administrées.

Cette vulnérabilité peut être employée par un attaquant distant pour administrer le système.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2002-0013 CVE-2002-0053

Vulnérabilités multiples des requêtes SNMP

Synthesis of the vulnerability

En envoyant des requêtes malicieuses, un attaquant peut provoquer des vulnérabilités dans les dispositifs.
Impacted products: Super Stack PS Hub, Super Stack Switch, IPSO, Cisco Access Server, Cisco Cache Engine, Cisco Catalyst, Cisco CSS, IOS by Cisco, Cisco Router, Cisco VPN Concentrator, WebNS, Debian, FreeBSD, MPE/iX, OpenView, OpenView Operations, Tru64 UNIX, HP-UX, AIX, Domino, Mandriva Linux, Windows 2000, Windows 95, Windows 98, Windows NT, Windows XP, Net-SNMP, Netware, openSUSE, Oracle DB, Oracle Directory Server, Oracle iPlanet Web Proxy Server, Solaris, Trusted Solaris, SNMP protocol, RedHat Linux, OpenLinux.
Severity: 3/4.
Consequences: administrator access/rights, denial of service on server.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 13/02/2002.
Revisions dates: 14/02/2002, 15/02/2002, 18/02/2002, 19/02/2002, 20/02/2002, 21/02/2002, 22/02/2002, 25/02/2002, 26/02/2002, 27/02/2002, 28/02/2002, 04/03/2002, 05/03/2002, 06/03/2002, 07/03/2002, 14/03/2002, 18/03/2002, 21/03/2002, 29/03/2002, 03/04/2002, 04/04/2002, 08/04/2002, 09/04/2002, 11/04/2002, 15/04/2002, 18/04/2002, 19/04/2002, 25/04/2002, 29/04/2002, 14/05/2002, 17/05/2002, 05/06/2002, 07/06/2002, 10/06/2002, 19/06/2002, 11/07/2002, 22/07/2002, 09/08/2002, 12/08/2002, 28/08/2002, 10/09/2002, 20/02/2003, 24/10/2003.
Identifiers: 20020201-01-P, 20020213a, 20020404-01-P, BID-4089, BID-4132, BID-4140, BID-4168, BID-4590, BID-4732, BID-5043, BID-8881, BID-8882, CA-2002-03, CERTA-2002-AVI-033, CERTA-2002-AVI-034, CERTA-2002-AVI-038, CERTA-2002-AVI-069, CERTA-2002-AVI-125, CERTA-2002-AVI-174, CIAC M-042, CISCO20020212, CISCO20020225, Compaq SSRT0799, CSSA-2002-004, CSSA-2002-004.1, CVE-2002-0013, CVE-2002-0053, DSA-111, DSA-111-2, FreeBSD-SA-02:11, HP184, HPMPE15, ISS0110, ISS 110, IY17630, IY20943, M-042, MDKSA-2002:014, MS02-006, Netscreen 20020213a, Novell TID 2002-2961546, ORACLE030, Q314147, RHSA-2001:163, RHSA-2002:088, Security Alert 30, SGI 20020201, SGI 20020404, SSRT0799, Sun #00215, Sun 215, Sun Alert 42769, Sun Alert 43365, Sun Alert 43704, Sun Alert 43985, Sun Alert 44605, Sun Alert 46343, Sun Alert 57404, Sun Alert ID 42769, Sun Alert ID 43365, Sun Alert ID 43704, Sun Alert ID 43985, Sun Alert ID 44605, Sun Alert ID 46343, Sun Alert ID 57404, Sun BugID 4425460, Sun BugID 4563124, Sun BugID 4637910, Sun BugID 4640046, Sun BugID 4641068, Sun BugID 4641295, Sun BugID 4643692, Sun BugID 4648503, Sun BugID 4655355, SUSE-SA:2002:012, TID 2961546, TN 191059, V6-SNMPREQMULVULN, VIGILANCE-VUL-2268, VU#854306.

Description of the vulnerability

Le protocole SNMP permet d'obtenir des informations ou d'administrer à distance des dispositifs. La version 1 de ce protocole repose sur cinq types de paquets :
 - GetRequest : demande des informations
 - GetNextRequest : demande des informations à la chaîne
 - GetResponse : retourne la valeur désirée
 - SetRequest : affecte une variable
 - Trap : envoie une alerte
Les quatre premiers types emploient le port 161/udp. Les traps utilisent le port 162/udp.

Une étude a été menée sur de nombreux dispositifs et a révélé de nombreuses vulnérabilités dans les implémentations des requêtes SNMP. Les types concernés sont :
 - GetRequest
 - GetNextRequest
 - SetRequest

Un attaquant distant peut donc envoyer des paquets UDP malicieux destinés au port 161 dans le but de provoquer :
 - des buffers overflow
 - des attaques par format
 - etc.
Ceux-ci peuvent avoir des impacts variés :
 - obtention des droits d'administration
 - déni de service
 - comportement anormal du dispositif
 - etc.

Certaines de ces attaques nécessitent des community string corrects, alors que d'autres peuvent être menées de manière anonyme.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2002-0012 CVE-2002-0053

Vulnérabilités multiples des trap SNMP

Synthesis of the vulnerability

En envoyant des paquets trap malicieux, un attaquant peut provoquer des vulnérabilités dans les dispositifs.
Impacted products: Super Stack PS Hub, Super Stack Switch, IPSO, Cisco Access Server, Cisco Cache Engine, Cisco Catalyst, Cisco CSS, IOS by Cisco, Cisco Router, Cisco VPN Concentrator, WebNS, Debian, FreeBSD, MPE/iX, OpenView, OpenView Operations, Tru64 UNIX, HP-UX, AIX, Domino, Mandriva Linux, Windows 2000, Windows 95, Windows 98, Windows NT, Windows XP, Net-SNMP, Netware, openSUSE, Oracle DB, Oracle Directory Server, Oracle iPlanet Web Proxy Server, Solaris, Trusted Solaris, SNMP protocol, RedHat Linux, OpenLinux.
Severity: 3/4.
Consequences: administrator access/rights, denial of service on server.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 2.
Creation date: 13/02/2002.
Revisions dates: 14/02/2002, 15/02/2002, 18/02/2002, 19/02/2002, 20/02/2002, 22/02/2002, 25/02/2002, 26/02/2002, 27/02/2002, 28/02/2002, 04/03/2002, 05/03/2002, 06/03/2002, 07/03/2002, 14/03/2002, 18/03/2002, 21/03/2002, 03/04/2002, 04/04/2002, 08/04/2002, 09/04/2002, 11/04/2002, 15/04/2002, 18/04/2002, 19/04/2002, 25/04/2002, 29/04/2002, 17/05/2002, 05/06/2002, 07/06/2002, 19/06/2002, 11/07/2002, 28/08/2002, 10/09/2002.
Identifiers: 20020201-01-P, 20020213a, 20020404-01-P, BID-4088, BID-4132, BID-4140, BID-4168, BID-4203, BID-4590, BID-5043, CA-2002-03, CERTA-2002-AVI-033, CERTA-2002-AVI-034, CERTA-2002-AVI-038, CERTA-2002-AVI-069, CERTA-2002-AVI-125, CIAC M-042, CISCO20020212, CISCO20020225, Compaq SSRT0799, CSSA-2002-004, CSSA-2002-004.1, CVE-2002-0012, CVE-2002-0053, DSA-111, DSA-111-2, FreeBSD-SA-02:11, HP184, HPMPE15, IBM-APAR-IY17630, IBM-APAR-IY20943, ISS0110, ISS 110, IY17630, IY20943, M-042, MDKSA-2002:014, MS02-006, Netscreen 20020213a, Novell TID 2002-2961546, ORACLE030, Q314147, RHSA-2001:163, RHSA-2002:088, Security Alert 30, SGI 20020201, SGI 20020404, SSRT0799, Sun Alert 43985, Sun Alert ID 43985, Sun BugID 4425460, Sun BugID 4643692, Sun BugID 4648503, SUSE-SA:2002:012, TID 2961546, TN 191059, V6-SNMPTRAPMULVULN, VIGILANCE-VUL-2269, VU#107186.

Description of the vulnerability

Le protocole SNMP permet d'obtenir des informations ou d'administrer à distance des dispositifs. La version 1 de ce protocole repose sur cinq types de paquets :
 - GetRequest : demande des informations
 - GetNextRequest : demande des informations à la chaîne
 - GetResponse : retourne la valeur désirée
 - SetRequest : affecte une variable
 - Trap : envoie une alerte
Les quatre premiers types emploient le port 161/udp. Les traps utilisent le port 162/udp.

Une étude a été menée sur de nombreux dispositifs et a révélé de nombreuses vulnérabilités dans les implémentations des trap SNMP.

Un attaquant distant peut donc envoyer des paquets UDP malicieux destinés au port 162 dans le but de provoquer :
 - des buffers overflow
 - des attaques par format
 - etc.
Ceux-ci peuvent avoir des impacts variés :
 - obtention des droits d'administration
 - déni de service
 - comportement anormal du dispositif
 - etc.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.