---------------------------------------------------------------------- Are you missing: SECUNIA ADVISORY ID: Critical: Impact: Where: within the advisory below? This is now part of the Secunia commercial solutions. Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: HP OpenView Network Node Manager Unspecified Code Execution SECUNIA ADVISORY ID: SA34942 VERIFY ADVISORY: http://secunia.com/advisories/34942/ DESCRIPTION: A vulnerability has been reported in HP OpenView Network Node Manager, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an unspecified error, which can be exploited to execute arbitrary code. No further information is currently available. The vulnerability is reported in version 7.01, 7.51, and 7.53 running on HP-UX, Linux, Solaris, and Windows. SOLUTION: Apply patches or archive files. -- OV NNM v7.53 -- HP-UX (IA): PHSS_39246 or subsequent HP-UX (PA): PHSS_39245 or subsequent Linux RedHatAS2.1: LXOV_00093 or subsequent Linux RedHat4AS-x86_64: LXOV_00094 or subsequent Solaris: PSOV_03519 or subsequent Windows: NNM_01197 or subsequent -- OV NNM v7.51 -- Upgrade to NNM version 7.53 and apply the patches for NNM 7.53. ftp://nnm_753:update@hprc.external.hp.com/ -- OV NNM v7.01 with Intermediate Patch 12 -- HP-UX (PA): PHSS_38761 Archive File: SSRT080125.701_IP12.hotfix.tar MD5Sum: dbe7aec4e4a800c13eee0a46cd93f516 Solaris: PSOV_03516 Archive File: SSRT080125.701_IP12.hotfix.tar MD5Sum: dbe7aec4e4a800c13eee0a46cd93f516 Windows: NNM_01194 Archive File: SSRT080125.701_IP12.hotfix.tar MD5Sum: dbe7aec4e4a800c13eee0a46cd93f516 PROVIDED AND/OR DISCOVERED BY: The vendor credits iDefense. ORIGINAL ADVISORY: HPSBMA02425 SSRT080091: https://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01728300 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------