---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: HP Network Node Manager Arbitrary Command Execution Vulnerability SECUNIA ADVISORY ID: SA38528 VERIFY ADVISORY: http://secunia.com/advisories/38528/ DESCRIPTION: HP has acknowledged a vulnerability in HP Network Node Manager, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an unspecified error, which can be exploited to execute arbitrary commands. The vulnerability is reported in versions 8.10, 8.11, 8.12, and 8.13 running on HP-UX, Linux, Solaris, and Windows. SOLUTION: Apply patches. http://support.openview.hp.com/selfsolve/patches HP-UX (IA): Apply patch PHSS_40368 or subsequent Linux RedHat4AS: Apply patch NNM810L_00006 or subsequent Solaris: Apply patch NNM810S_00006 or subsequent Windows: Apply patch NNM810W_00006 or subsequent PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: HPSBMA02484 SSRT090076: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01954593 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------