HP Operations Manager SourceView ActiveX LoadFile / SaveFile Stack Overflows

This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is susceptible to
buffer overflow attacks.

Description :

The SourceView ActiveX control, a component of HP Operations Manager,
installed on the remote Windows host reportedly is affected by buffer
overflows that can be triggered by passing specially crafted Unicode
strings to the 'LoadFile' or 'SaveFile' methods.

If an attacker can trick a user on the affected host into viewing a
specially crafted HTML document, he can leverage this issue to execute
arbitrary code on the affected system subject to the user's
privileges.

See also :

http://www.nessus.org/u?08826911
http://seclists.org/fulldisclosure/2010/Apr/250
http://www.nessus.org/u?333a47bf

Solution :

Apply the appropriate patch referenced in HP's advisory.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 45593 (hpom_srcvw4_activex_overflow.nasl)

Bugtraq ID: 39578

CVE ID: CVE-2010-1033

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now