Lucene search

K
saintSAINT CorporationSAINT:B5BF15B3A7BAF23022FAA1687437F75C
HistoryNov 06, 2009 - 12:00 a.m.

HP Power Manager Remote Code Execution

2009-11-0600:00:00
SAINT Corporation
download.saintcorporation.com
44

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.594

Percentile

97.8%

Added: 11/06/2009
CVE: CVE-2009-2685
BID: 36933
OSVDB: 59684

Background

HP Power Manager is a web-based application that enables administrators to manage an HP UPS from a browser-based management console.

Problem

A stack-based buffer overflow in the HP Power Manager management web server allows remote attackers to execute arbitrary code via the Login variable of the login form.

Resolution

HP’s resolution is to limit access to trusted users.

References

<http://www.zerodayinitiative.com/advisories/ZDI-09-081/&gt;

Limitations

Exploit works on HP Power Manager 4.2.7. Windows patch KB933729 (rpct4.dll version 5.2.3790.4115) must be installed.

Platforms

Windows

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.594

Percentile

97.8%