ID

VAR-201107-0275


CVE

CVE-2011-2608


TITLE

HP Operations Manager 'Register' Request Arbitrary File Deletion Vulnerability

Trust: 0.9

sources: BID: 48481 // CNNVD: CNNVD-201106-356

DESCRIPTION

ovbbccb.exe 6.20.50.0 and other versions in HP OpenView Performance Agent 4.70 and 5.0; and Operations Agent 11.0, 8.60.005, 8.60.006, 8.60.007, 8.60.008, 8.60.501, and 8.53; allows remote attackers to delete arbitrary files via a full pathname in the File field in a Register command. HP Operations Manager is prone to an arbitrary-file-deletion vulnerability. An attacker can exploit this issue to delete arbitrary files on an affected computer. Successful exploits will result in a denial-of-service condition or the corruption of applications running on the affected computer. References: CVE-2011-2608, SA45079, SA44321 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Performance Agent v5.0, and v4.70 running on AIX, HP-UX, Linux, Solaris, and Windows; Operations Agent v11.0, v8.60.0xx, v8.60.5xx running on AIX, HP-UX, Linux, Solaris, and Windows. BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2011-2608 (AV:N/AC:L/Au:N/C:P/I:C/A:C) 9.7 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 The Hewlett-Packard Company thanks Abdul-Aziz Hariri coordinating with Secunia for reporting this vulnerability to security-alert@hp.com RESOLUTION HP has provided the following resolve this vulnerability. Please contact your HP Software support channel to request the hotfixes below. For Performance Agent v5.0 and v4.7 please request this hotfix from support: Performance Agent/OVPA_C.05.00.100_ALL/ Security issue, no details available For Operations Agent v11.0 please install the latest patch v11.01.003 For Operations Agent v8.60.005, c8.60.006, v8.60.007, v8.60.008 please request hotfix from support: LCore/Lcore_06.20/ Security issue, no details available For Operations Agent v8.60.501 please request hotfix from support: LCore/Lcore_06.21.501/ Security issue, no details available For Operations Agent v8.53 request hotfix from support: LCore/Lcore_06.20/ Security issue, no details available HISTORY Version:1 (rev.1) - 18 July 2011 Initial Release Version:2 (rev.2) - 27 July 2011 Re-release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For further information, contact normal HP Services support channel. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2011 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk4xmnYACgkQ4B86/C0qfVmjYgCfecas6Z8B7Yz0lE914CADLCWl JHwAnipHP6J3ehLiL9oLhQ4gsvWD+8Ua =V0C9 -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Frost & Sullivan 2011 Report: Secunia Vulnerability Research \"Frost & Sullivan believes that Secunia continues to be a major player in the vulnerability research market due to its diversity of products that provide best-in-class coverage, quality, and usability.\" This is just one of the key factors that influenced Frost & Sullivan to select Secunia over other companies. Read the report here: http://secunia.com/products/corporate/vim/fs_request_2011/ ---------------------------------------------------------------------- TITLE: HP Operations Manager OV Communication Broker Arbitrary File Deletion SECUNIA ADVISORY ID: SA45079 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/45079/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=45079 RELEASE DATE: 2011-06-28 DISCUSS ADVISORY: http://secunia.com/advisories/45079/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/45079/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=45079 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Luigi Auriemma has discovered a vulnerability in HP Operations Manager, which can be exploited by malicious people to delete files on a vulnerable system. The vulnerability is caused due to the OV Communications Broker service (ovbbccb.exe) deleting a file specified in a received "Register" request. SOLUTION: Restrict access to the OV Communication Broker service. PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma ORIGINAL ADVISORY: Luigi Auriemma: http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2011-2608 // JVNDB: JVNDB-2011-004752 // BID: 48481 // VULMON: CVE-2011-2608 // PACKETSTORM: 103543 // PACKETSTORM: 102631

AFFECTED PRODUCTS

vendor:hpmodel:operations agentscope:eqversion:11.0

Trust: 1.9

vendor:hpmodel:openview performance agentscope:eqversion:5.0

Trust: 1.9

vendor:hpmodel:openview performance agentscope:eqversion:4.70

Trust: 1.9

vendor:hpmodel:operations agentscope:eqversion:8.60.005

Trust: 1.6

vendor:hpmodel:operations agentscope:eqversion:8.60.008

Trust: 1.6

vendor:hpmodel:operations agentscope:eqversion:8.60.006

Trust: 1.6

vendor:hpmodel:operations agentscope:eqversion:8.60.501

Trust: 1.6

vendor:hpmodel:operations agentscope:eqversion:8.60.007

Trust: 1.6

vendor:hpmodel:operations agentscope:eqversion:8.53

Trust: 1.6

vendor:hewlett packardmodel:hp operations agentscope:eqversion:11.0

Trust: 0.8

vendor:hewlett packardmodel:hp operations agentscope:eqversion:8.60.005

Trust: 0.8

vendor:hewlett packardmodel:hp operations agentscope:eqversion:8.60.006

Trust: 0.8

vendor:hewlett packardmodel:hp operations agentscope:eqversion:8.60.007

Trust: 0.8

vendor:hewlett packardmodel:hp operations agentscope:eqversion:8.60.008

Trust: 0.8

vendor:hewlett packardmodel:hp operations agentscope:eqversion:8.60.501

Trust: 0.8

vendor:hewlett packardmodel:hp operations agentscope:eqversion:and 8.53

Trust: 0.8

vendor:hewlett packardmodel:openview performance agentscope:eqversion:4.70 and 5.0

Trust: 0.8

vendor:hpmodel:operations managerscope:eqversion:8.1

Trust: 0.3

vendor:hpmodel:operations agentscope:eqversion:8.60.5

Trust: 0.3

vendor:hpmodel:operations agentscope:eqversion:8.60

Trust: 0.3

sources: BID: 48481 // JVNDB: JVNDB-2011-004752 // CNNVD: CNNVD-201107-003 // NVD: CVE-2011-2608

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2011-2608
value: MEDIUM

Trust: 1.8

CNNVD: CNNVD-201107-003
value: MEDIUM

Trust: 0.6

VULMON: CVE-2011-2608
value: MEDIUM

Trust: 0.1

VULMON: CVE-2011-2608
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2011-2608 // JVNDB: JVNDB-2011-004752 // CNNVD: CNNVD-201107-003 // NVD: CVE-2011-2608

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2011-004752 // NVD: CVE-2011-2608

THREAT TYPE

remote

Trust: 1.3

sources: PACKETSTORM: 103543 // CNNVD: CNNVD-201106-356 // CNNVD: CNNVD-201107-003

TYPE

Configuration Error

Trust: 0.9

sources: BID: 48481 // CNNVD: CNNVD-201106-356

CONFIGURATIONS

sources: NVD: CVE-2011-2608

PATCH

title:HPSBMU02691 SSRT100483url:http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c02941034

Trust: 0.8

sources: JVNDB: JVNDB-2011-004752

EXTERNAL IDS

db:NVDid:CVE-2011-2608

Trust: 2.9

db:BIDid:48481

Trust: 2.6

db:SECUNIAid:45079

Trust: 1.8

db:SECTRACKid:1025715

Trust: 1.6

db:JVNDBid:JVNDB-2011-004752

Trust: 0.8

db:CNNVDid:CNNVD-201106-356

Trust: 0.6

db:XFid:68269

Trust: 0.6

db:CNNVDid:CNNVD-201107-003

Trust: 0.6

db:VULMONid:CVE-2011-2608

Trust: 0.1

db:PACKETSTORMid:103543

Trust: 0.1

db:PACKETSTORMid:102631

Trust: 0.1

sources: VULMON: CVE-2011-2608 // BID: 48481 // JVNDB: JVNDB-2011-004752 // PACKETSTORM: 103543 // PACKETSTORM: 102631 // CNNVD: CNNVD-201106-356 // CNNVD: CNNVD-201107-003 // NVD: CVE-2011-2608

REFERENCES

url:http://www.securityfocus.com/bid/48481

Trust: 2.4

url:http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt

Trust: 2.1

url:http://securitytracker.com/id?1025715

Trust: 1.7

url:http://secunia.com/advisories/45079

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=131188898632504&w=2

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/68269

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2608

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2608

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/68269

Trust: 0.6

url:https://h10078.www1.hp.com/cda/hpms/display/main/hpms_content.jsp?zn=bto&cp=1-11-15-28^1745_4000_100__

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2608

Trust: 0.1

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.1

url:http://secunia.com/products/corporate/vim/fs_request_2011/

Trust: 0.1

url:http://secunia.com/advisories/45079/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/45079/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=45079

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULMON: CVE-2011-2608 // BID: 48481 // JVNDB: JVNDB-2011-004752 // PACKETSTORM: 103543 // PACKETSTORM: 102631 // CNNVD: CNNVD-201106-356 // CNNVD: CNNVD-201107-003 // NVD: CVE-2011-2608

CREDITS

Luigi Auriemma

Trust: 0.9

sources: BID: 48481 // CNNVD: CNNVD-201106-356

SOURCES

db:VULMONid:CVE-2011-2608
db:BIDid:48481
db:JVNDBid:JVNDB-2011-004752
db:PACKETSTORMid:103543
db:PACKETSTORMid:102631
db:CNNVDid:CNNVD-201106-356
db:CNNVDid:CNNVD-201107-003
db:NVDid:CVE-2011-2608

LAST UPDATE DATE

2022-05-04T09:57:39.220000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2011-2608date:2017-08-29T00:00:00
db:BIDid:48481date:2011-07-28T18:10:00
db:JVNDBid:JVNDB-2011-004752date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201106-356date:2011-06-30T00:00:00
db:CNNVDid:CNNVD-201107-003date:2011-07-04T00:00:00
db:NVDid:CVE-2011-2608date:2017-08-29T01:29:00

SOURCES RELEASE DATE

db:VULMONid:CVE-2011-2608date:2011-07-01T00:00:00
db:BIDid:48481date:2011-06-28T00:00:00
db:JVNDBid:JVNDB-2011-004752date:2012-03-27T00:00:00
db:PACKETSTORMid:103543date:2011-07-29T02:21:38
db:PACKETSTORMid:102631date:2011-06-28T05:57:53
db:CNNVDid:CNNVD-201106-356date:1900-01-01T00:00:00
db:CNNVDid:CNNVD-201107-003date:2011-07-04T00:00:00
db:NVDid:CVE-2011-2608date:2011-07-01T10:55:00