This Metasploit module exploits a buffer overflow in HP NNM's webappmon.exe. The vulnerability occurs when function "execvp_nc" fails to do any bounds-checking before strcat is used to append user-supplied input to a buffer.
bf5a083c853de0a9689a85f8964a561ceaf21211433507a6060dcd2fcafba338
Month Of Abysssec Undisclosed Bugs - HP OpenView NNM suffers from a remote code execution vulnerability in webappmon.exe.
12ef3455516aa84e3f29c5a3ac446c11e7008731039e239c72ffb0cfe850f707
Month Of Abysssec Undisclosed Bugs - HP OpenView NNM suffers from a remote code execution vulnerability in webappmon.exe.
710c1a5cb834ba899d29c9c85f5b1dae4fb8987d5eb5a2c32d178d3639543f12
Zero Day Initiative Advisory 10-137 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ov.dll module which is loaded by the webappmon.exe CGI program. This DLL defines a function execvp_nc which unsafely concatenates a controllable command string into a statically allocated stack buffer. By supplying overly large values to variables passed through an HTTP request a strcat_new can be made to overflow this buffer. An attacker can leverage this to execute arbitrary code under the context of the user running the webserver.
4357fb05cdbff5f38d74f3d1f6bd8c381ce35de1debafee648b5140a050a7975
VUPEN Vulnerability Research Team discovered a critical vulnerability in HP OpenView Network Node Manager (OV NNM). This vulnerability is caused by a buffer overflow error in the "nnmrptconfig.exe" CGI when processing an overly long parameter value, which could be exploited by remote unauthenticated attackers to execute arbitrary code.
1117cd79239d8fd237e9ff9b178664136be4d9c9bfe965119bf853f606ba7bdc
HP Security Bulletin - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM) running on Windows. The vulnerability could be exploited remotely to execute arbitrary code.
ad437943a99a94a28a643b15ae3422e9d2fa3ce412d8fefb9c02b0cf8f0668f2