|CVSS SCORE||10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)|
OpenView Network Node Manager
|TREND MICRO CUSTOMER PROTECTION||Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 10529. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
The specific flaw exists within nnmRotConfig.exe CGI program. When processing crafted nameParams parameters, there exists an insufficient boundary check that can lead to a insufficient heap buffer, enabling a heap overflow. This can lead to memory corruption which can be leveraged to execute arbitrary code under the context of the target service.
Hewlett-Packard has issued an update to correct this vulnerability. More details can be found at: