ID

VAR-200708-0119


CVE

CVE-2007-4241


TITLE

HP-UX upper Cisco Local Director of HP Controller Vulnerable to buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2007-004247

DESCRIPTION

Buffer overflow in ldcconn in Hewlett-Packard (HP) Controller for Cisco Local Director on HP-UX 11.11i allows remote attackers to execute arbitrary code via a long string to TCP port 17781. HP-UX is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. An attacker can exploit this issue to execute arbitrary code with superuser privileges. Successful attacks will completely compromise affected computers. HP-UX 11.11i is vulnerable; other versions may also be affected. HP-UX is a UNIX operating system developed by HP. Remote attackers may use this vulnerability to control the server. ---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: HP-UX 11.11 ldcconn Buffer Overflow Vulnerability SECUNIA ADVISORY ID: SA26373 VERIFY ADVISORY: http://secunia.com/advisories/26373/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From local network OPERATING SYSTEM: HP-UX 11.x http://secunia.com/product/138/ DESCRIPTION: A vulnerability has been reported in HP-UX, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in ldcconn and can be exploited to cause a buffer overflow by sending an overly long string to the service (default port 17781/TCP). Successful exploitation allows execution of arbitrary code. The vulnerability is reported in the HP Controller for Cisco Local Director package on HP-UX 11.11i. SOLUTION: The vendor recommends using another tool as the package has been obsolete since 2002 and is no longer supported. PROVIDED AND/OR DISCOVERED BY: iDefense Labs ORIGINAL ADVISORY: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=572 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-4241 // JVNDB: JVNDB-2007-004247 // BID: 25227 // VULHUB: VHN-27603 // PACKETSTORM: 58393

AFFECTED PRODUCTS

vendor:hpmodel:hp-uxscope:eqversion:11.11i

Trust: 1.6

vendor:hewlett packardmodel:hp-uxscope:eqversion:9.00 11.11i

Trust: 0.8

vendor:hpmodel:hp-ux 11.11iscope: - version: -

Trust: 0.3

sources: BID: 25227 // JVNDB: JVNDB-2007-004247 // CNNVD: CNNVD-200708-147 // NVD: CVE-2007-4241

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-4241
value: HIGH

Trust: 1.0

NVD: CVE-2007-4241
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200708-147
value: CRITICAL

Trust: 0.6

VULHUB: VHN-27603
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-4241
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-27603
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-27603 // JVNDB: JVNDB-2007-004247 // CNNVD: CNNVD-200708-147 // NVD: CVE-2007-4241

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-4241

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200708-147

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200708-147

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-004247

PATCH

title:Top Pageurl:http://www.hp.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-004247

EXTERNAL IDS

db:NVDid:CVE-2007-4241

Trust: 2.8

db:BIDid:25227

Trust: 2.0

db:SECUNIAid:26373

Trust: 1.8

db:VUPENid:ADV-2007-2813

Trust: 1.7

db:SECTRACKid:1018524

Trust: 1.7

db:JVNDBid:JVNDB-2007-004247

Trust: 0.8

db:CNNVDid:CNNVD-200708-147

Trust: 0.7

db:IDEFENSEid:20070807 HEWLETT-PACKARD HP-UX REMOTE LDCCONN BUFFER OVERFLOW VULNERABILITY

Trust: 0.6

db:XFid:35847

Trust: 0.6

db:VULHUBid:VHN-27603

Trust: 0.1

db:PACKETSTORMid:58393

Trust: 0.1

sources: VULHUB: VHN-27603 // BID: 25227 // JVNDB: JVNDB-2007-004247 // PACKETSTORM: 58393 // CNNVD: CNNVD-200708-147 // NVD: CVE-2007-4241

REFERENCES

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=572

Trust: 2.1

url:http://www.securityfocus.com/bid/25227

Trust: 1.7

url:http://securitytracker.com/id?1018524

Trust: 1.7

url:http://secunia.com/advisories/26373

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/2813

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35847

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4241

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4241

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/35847

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2813

Trust: 0.6

url:http://www.hp.com/products1/unix/

Trust: 0.3

url:/archive/1/475766

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/advisories/26373/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/138/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-27603 // BID: 25227 // JVNDB: JVNDB-2007-004247 // PACKETSTORM: 58393 // CNNVD: CNNVD-200708-147 // NVD: CVE-2007-4241

CREDITS

iDEFENSE

Trust: 0.6

sources: CNNVD: CNNVD-200708-147

SOURCES

db:VULHUBid:VHN-27603
db:BIDid:25227
db:JVNDBid:JVNDB-2007-004247
db:PACKETSTORMid:58393
db:CNNVDid:CNNVD-200708-147
db:NVDid:CVE-2007-4241

LAST UPDATE DATE

2024-11-23T22:54:03.156000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-27603date:2017-07-29T00:00:00
db:BIDid:25227date:2015-05-07T17:36:00
db:JVNDBid:JVNDB-2007-004247date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200708-147date:2007-08-14T00:00:00
db:NVDid:CVE-2007-4241date:2024-11-21T00:35:07.550

SOURCES RELEASE DATE

db:VULHUBid:VHN-27603date:2007-08-08T00:00:00
db:BIDid:25227date:2007-08-07T00:00:00
db:JVNDBid:JVNDB-2007-004247date:2012-09-25T00:00:00
db:PACKETSTORMid:58393date:2007-08-10T02:01:07
db:CNNVDid:CNNVD-200708-147date:2007-08-08T00:00:00
db:NVDid:CVE-2007-4241date:2007-08-08T22:17:00