HP iNode Management Center Remote Code Execution (HPSB3C02687)

critical Nessus Plugin ID 55577

Synopsis

The version of iNode Management Center contains a remote code execution vulnerability.

Description

The remote Windows host has an installation of HP iNode Management Center that is affected by a remote code execution vulnerability. An unauthenticated remote attacker can send a specially crafted packet that could result in a stack-based buffer overflow. A successful attack will allow running arbitrary code with SYSTEM privileges.

Solution

Upgrade to iNode Management Center 5.00.0103, which is distributed with UAM 5.0 SP1 E0101P03.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-11-232/

https://seclists.org/bugtraq/2011/Jul/8

http://www.nessus.org/u?9f3a3449

Plugin Details

Severity: Critical

ID: 55577

File Name: hp_inode_management_center_HPSB3C02687.nasl

Version: 1.11

Type: local

Agent: windows

Family: Windows

Published: 7/13/2011

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:hp:inode_management_center_pc

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/30/2011

Vulnerability Publication Date: 6/30/2011

Exploitable With

CANVAS (White_Phosphorus)

Core Impact

ExploitHub (EH-11-729)

Reference Information

CVE: CVE-2011-1867

BID: 48527

Secunia: 45129