HP B-series SAN Network Advisor < 12.1.1 Remote Code Execution (Linux)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote host has an application that is affected by a remote code
execution vulnerability.

Description :

The version of HP B-series SAN Network Advisor on the remote Linux host
is a version prior to 12.1.1. As such, it is affected by a remote code
execution vulnerability.

It should be noted that while the associated references report on a
remote code execution vulnerability in EMC Connectrix Manager
Converged Network Edition, HP B-series SAN Network Advisor is the same
product under an HP name and is, therefore, also affected. Moreover,
the issue is actually due to a third-party product from Brocade.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-13-278/
http://www.zerodayinitiative.com/advisories/ZDI-13-279/
http://www.zerodayinitiative.com/advisories/ZDI-13-280/
http://www.zerodayinitiative.com/advisories/ZDI-13-281/
http://www.zerodayinitiative.com/advisories/ZDI-13-282/
http://www.zerodayinitiative.com/advisories/ZDI-13-283/
http://attrition.org/pipermail/vim/2014-January/002755.html
http://www.nessus.org/u?2b95f7e9
http://www.securityfocus.com/archive/1/530357/30/0/threaded

Solution :

Upgrade to HP B-series SAN Network Advisor 12.1.1 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: General

Nessus Plugin ID: 72178 ()

Bugtraq ID: 64242

CVE ID: CVE-2013-6810