Waraxe IT Security Portal
Login or Register
January 22, 2025
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 115
Members: 0
Total: 115
Full disclosure
CVE-2024-48463
CyberDanube Security Research 20250107-0 | Multiple Vulnerabilities in ABB AC500v3
Certified Asterisk Security Release certified-20.7-cert4
Certified Asterisk Security Release certified-18.9-cert13
Asterisk Security Release 22.1.1
Asterisk Security Release 18.26.1
[asterisk-dev] Asterisk Security Release 21.6.1
[asterisk-dev] Asterisk Security Release 20.11.1
Multiple vulnerabilities in CTFd versions <= 3.7.4
IBMi Navigator / CVE-2024-51464 / HTTP Security Token Bypass
IBMi Navigator / CVE-2024-51463 / Server Side Request Forgery(SSRF)
CyberDanube Security Research 20241219-0 | Authenticated Remote Code Execution in Ewon Flexy 205
Stored XSS with Filter Bypass - blogenginev3.3.8
[SYSS-2024-085]: Broadcom CA Client Automation - Improper Privilege Management (CWE-269)
[KIS-2024-07] GFI Kerio Control <= 9.4.5 Multiple HTTP Response Splitting Vulnerabilities
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> All other security holes -> ZDI-09-081: Hewlett-Packard Power Manager Stack Overflow
Post new topicReply to topic View previous topic :: View next topic
ZDI-09-081: Hewlett-Packard Power Manager Stack Overflow
PostPosted: Sat Nov 07, 2009 8:38 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




Code:

ZDI-09-081: Hewlett-Packard Power Manager Administration Web Server Stack Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-09-081
November 5, 2009

-- CVE ID:
CVE-2009-2685

-- Affected Vendors:
Hewlett-Packard

-- Affected Products:
Hewlett-Packard Power Manager

-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 8314.
For further product information on the TippingPoint IPS, visit:

http://www.tippingpoint.com

-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Hewlett-Packard Power Manager.
Authentication is not required to exploit this vulnerability.

The specific flaw exists in the handling of URL parameters when posting
to the login form of the web based management web server. Proper bounds
checking is not applied when parsing the Login variable which can result
in an exploitable stack overflow. Successful exploitation can lead to
complete system compromise under the SYSTEM credentials.

-- Vendor Response:
Hewlett-Packard has issued an update to correct this vulnerability. More
details can be found at:

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01905743

-- Disclosure Timeline:
2009-06-25 - Vulnerability reported to vendor
2009-11-05 - Coordinated public release of advisory

-- Credit:
This vulnerability was discovered by:
* Janek Vind

-- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

http://www.zerodayinitiative.com/advisories/disclosure_policy/
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Mon Nov 09, 2009 9:07 am Reply with quote
x3roconf_
Advanced user
Advanced user
Joined: May 01, 2008
Posts: 101




Great find. Smile
View user's profile Send private message
ZDI-09-081: Hewlett-Packard Power Manager Stack Overflow
www.waraxe.us Forum Index -> All other security holes
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.035 Seconds