---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: HP OpenView Network Node Manager SNMP and MIB Code Execution Vulnerability SECUNIA ADVISORY ID: SA35408 VERIFY ADVISORY: http://secunia.com/advisories/35408/ DESCRIPTION: A vulnerability has been reported in HP OpenView Network Node Manager, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. The vulnerability is caused due to an unspecified error when using SNMP and MIB and can be exploited to cause a DoS or execute arbitrary code on an affected system. The vulnerability is reported in HP OpenView Network Node Manager (OV NNM) version 7.51 and 7.53 on HP-UX, Solaris, Linux, and Windows running SNMP and MIB before revision 1.30.009. SOLUTION: Apply patches. http://support.openview.hp.com/selfsolve/patches HP-UX (IA): NNM753CPTIPF_00002 or subsequent HP-UX (PA): NNM753CPTHP_00002 or subsequent Linux RedHatAS2.1: NNM753CPTLIN24_00002 or subsequent Linux RedHat4AS-x86_64: NNM753CPTLIN26_00002 or subsequent Solaris: NNM753CPTSOL_00002 or subsequent Windows: NNM753CPTWIN_00002 or subsequent PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: HPSBMA02430 SSRT080094: https://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01754877 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------