---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta 16 days left of beta period. The 1st generation of the Secunia Network Software Inspector (NSI) has been available for corporate users for almost 1 year and its been a tremendous success. The 2nd generation Secunia NSI is built on the same technology as the award winning Secunia PSI, which has already been downloaded and installed on more than 400,000 computers world wide. Learn more / Download (instant access): http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: HP OpenView Network Node Manager Multiple Vulnerabilities SECUNIA ADVISORY ID: SA29796 VERIFY ADVISORY: http://secunia.com/advisories/29796/ CRITICAL: Less critical IMPACT: Exposure of system information, Exposure of sensitive information, DoS WHERE: >From local network SOFTWARE: HP OpenView Network Node Manager (NNM) 7.x http://secunia.com/product/3608/ DESCRIPTION: Some vulnerabilities have been reported in HP OpenView Network Node Manager, which can be exploited by malicious people to disclose certain information or cause a DoS (Denial of Service). 1) An error in the ovtopmd.exe service can be exploited to cause the service to terminate via a type 0x36 request sent to default port 2532/TCP. 2) An input validation error in the ovalarmsrv.exe service can be exploited to cause the service to consume large amounts of CPU resources by sending specially crafted requests (e.g. type 25, 45, 46, 47 and 81) to default port 2954/TCP. 3) A NULL-pointer dereference error within ovalarmsrv.exe can be exploited via a specially crafted request sent to default port 2954/TCP. 4) It is possible to download or view arbitrary files by sending an HTTP request to the OpenView5.exe CGI application and passing strings containing directory traversal sequences to the "Action" parameter. The vulnerabilities are reported in version 7.53. Other versions may also be affected. SOLUTION: Restrict network access to the services. Filter malicious characters and character sequences using a web proxy. PROVIDED AND/OR DISCOVERED BY: 1-3) Luigi Auriemma 4) Independently discovered by: * Luigi Auriemma * JJ Reyes, Secunia Research ORIGINAL ADVISORY: Luigi Auriemma: http://aluigi.altervista.org/adv/closedviewx-adv.txt Secunia Research: http://secunia.com/secunia_research/2008-4/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------