CVE-2008-1842
Published Apr 16, 2008
Last updated 6 years ago
Overview
- Description
- Integer signedness error in ovspmd.exe in HP OpenView Network Node Manager (OV NNM) 8.01, and 7.53 and earlier, allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a long request to TCP port 8886 that begins with a certain negative integer, which passes a signed comparison and triggers a heap-based buffer overflow.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-189
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "165864E6-F9B8-4E67-8344-6C08EA9E342E", "versionEndIncluding": "7.53" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4670BB0B-F94E-44FE-A1E5-2EEAF58C0C75" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "522BF98F-FFEB-4867-AC18-CDC872F2099D" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:5.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1218361D-6F62-4035-B0B2-9BEB19539A70" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5701BC4B-8B3E-4AAD-965F-EDB406D5FBE7" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39C1B197-F043-4FB7-AFB3-AFC8B8B5B051" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8E17259-60C7-4F6B-AB23-06E406FA006D" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8A2AF84-E59A-4725-85E6-D2AF56F97F8E" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E441789-E4C5-4D40-A0BE-1A20F5F90A4B" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65AAF9FC-36B2-4939-BAB5-829E13D310FC" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.31:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87DF6D25-9B6E-4862-9252-92C8DB6F3F9F" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:6.41:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D24CCB02-FFFE-448B-AF31-D9AC39443552" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C89F2AB-45CF-4455-920F-396852C862E0" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E31677CB-1DAC-498C-9372-D442D60A6389" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.50:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "725DA559-EE1C-4CCE-91C4-D5AAA940D855" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5CC1E39-5607-41A9-8BBE-A51F1AC9D5CB" }, { "criteria": "cpe:2.3:a:hp:openview_network_node_manager:8.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F556FF2D-391F-476E-82CE-8423CD3E540A" } ], "operator": "OR" } ] } ]