CVE-2008-1842
Severity CVSS v4.0:
Pending analysis
Type:
CWE-189
Numeric Errors
Publication date:
16/04/2008
Last modified:
09/04/2025
Description
Integer signedness error in ovspmd.exe in HP OpenView Network Node Manager (OV NNM) 8.01, and 7.53 and earlier, allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a long request to TCP port 8886 that begins with a certain negative integer, which passes a signed comparison and triggers a heap-based buffer overflow.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:hp:openview_network_node_manager:*:*:*:*:*:*:*:* | 7.53 (including) | |
cpe:2.3:a:hp:openview_network_node_manager:4.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:5.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:5.01:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:6.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:6.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:6.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:6.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:6.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:6.20:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:6.31:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:6.41:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:7.01:*:*:*:*:*:*:* | ||
cpe:2.3:a:hp:openview_network_node_manager:7.50:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://aluigi.altervista.org/adv/closedview-adv.txt
- http://aluigi.org/poc/closedview.zip
- http://marc.info/?l=bugtraq&m=121321155405849&w=2
- http://marc.info/?l=bugtraq&m=121321155405849&w=2
- http://marc.info/?l=bugtraq&m=121321155405849&w=2
- http://secunia.com/advisories/29713
- http://securitytracker.com/id?1019821=
- http://www.securityfocus.com/archive/1/493781/100/0/threaded
- http://www.securityfocus.com/bid/28689
- http://www.vupen.com/english/advisories/2008/1159
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41737
- http://aluigi.altervista.org/adv/closedview-adv.txt
- http://aluigi.org/poc/closedview.zip
- http://marc.info/?l=bugtraq&m=121321155405849&w=2
- http://marc.info/?l=bugtraq&m=121321155405849&w=2
- http://marc.info/?l=bugtraq&m=121321155405849&w=2
- http://secunia.com/advisories/29713
- http://securitytracker.com/id?1019821=
- http://www.securityfocus.com/archive/1/493781/100/0/threaded
- http://www.securityfocus.com/bid/28689
- http://www.vupen.com/english/advisories/2008/1159
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41737