All the vulnerabilites related to hp - openview_performance_agent
cve-2011-2608
Vulnerability from cvelistv5
Published
2011-07-01 10:00
Modified
2024-08-06 23:08
Severity ?
Summary
ovbbccb.exe 6.20.50.0 and other versions in HP OpenView Performance Agent 4.70 and 5.0; and Operations Agent 11.0, 8.60.005, 8.60.006, 8.60.007, 8.60.008, 8.60.501, and 8.53; allows remote attackers to delete arbitrary files via a full pathname in the File field in a Register command.
References
http://securitytracker.com/id?1025715vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/68269vdb-entry, x_refsource_XF
http://marc.info/?l=bugtraq&m=131188898632504&w=2vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=131188898632504&w=2vendor-advisory, x_refsource_HP
http://aluigi.altervista.org/adv/ovbbccb_1-adv.txtx_refsource_MISC
http://www.securityfocus.com/bid/48481vdb-entry, x_refsource_BID
http://secunia.com/advisories/45079third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:08:23.891Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025715",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1025715"
          },
          {
            "name": "hp-operations-ovbbccb-file-deletion(68269)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68269"
          },
          {
            "name": "HPSBMU02691",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=131188898632504\u0026w=2"
          },
          {
            "name": "SSRT100483",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=131188898632504\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt"
          },
          {
            "name": "48481",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48481"
          },
          {
            "name": "45079",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45079"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-06-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ovbbccb.exe 6.20.50.0 and other versions in HP OpenView Performance Agent 4.70 and 5.0; and Operations Agent 11.0, 8.60.005, 8.60.006, 8.60.007, 8.60.008, 8.60.501, and 8.53; allows remote attackers to delete arbitrary files via a full pathname in the File field in a Register command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1025715",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1025715"
        },
        {
          "name": "hp-operations-ovbbccb-file-deletion(68269)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68269"
        },
        {
          "name": "HPSBMU02691",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=131188898632504\u0026w=2"
        },
        {
          "name": "SSRT100483",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=131188898632504\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt"
        },
        {
          "name": "48481",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48481"
        },
        {
          "name": "45079",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45079"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-2608",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ovbbccb.exe 6.20.50.0 and other versions in HP OpenView Performance Agent 4.70 and 5.0; and Operations Agent 11.0, 8.60.005, 8.60.006, 8.60.007, 8.60.008, 8.60.501, and 8.53; allows remote attackers to delete arbitrary files via a full pathname in the File field in a Register command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025715",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1025715"
            },
            {
              "name": "hp-operations-ovbbccb-file-deletion(68269)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68269"
            },
            {
              "name": "HPSBMU02691",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=131188898632504\u0026w=2"
            },
            {
              "name": "SSRT100483",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=131188898632504\u0026w=2"
            },
            {
              "name": "http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt",
              "refsource": "MISC",
              "url": "http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt"
            },
            {
              "name": "48481",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/48481"
            },
            {
              "name": "45079",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/45079"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-2608",
    "datePublished": "2011-07-01T10:00:00",
    "dateReserved": "2011-07-01T00:00:00",
    "dateUpdated": "2024-08-06T23:08:23.891Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-4349
Vulnerability from cvelistv5
Published
2008-10-23 21:00
Modified
2024-08-07 14:53
Severity ?
Summary
The Shared Trace Service (aka OVTrace) in HP Performance Agent C.04.70 (aka 4.70), HP OpenView Performance Agent C.04.60 and C.04.61, HP Reporter 3.8, and HP OpenView Reporter 3.7 (aka Report 3.70) allows remote attackers to cause a denial of service via an unspecified series of RPC requests (aka Trace Event Messages) that triggers an out-of-bounds memory access, related to an erroneous object reference.
References
http://securityreason.com/securityalert/4501third-party-advisory, x_refsource_SREASON
http://marc.info/?l=bugtraq&m=122876677518654&w=2vendor-advisory, x_refsource_HP
http://www.securitytracker.com/id?1021092vdb-entry, x_refsource_SECTRACK
https://exchange.xforce.ibmcloud.com/vulnerabilities/46028vdb-entry, x_refsource_XF
http://secunia.com/advisories/27054third-party-advisory, x_refsource_SECUNIA
http://secunia.com/secunia_research/2007-83/x_refsource_MISC
http://www.securityfocus.com/archive/1/497648/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/31860vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2008/2888vdb-entry, x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=122876827120961&w=2vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=122876827120961&w=2vendor-advisory, x_refsource_HP
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:53:55.597Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "4501",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4501"
          },
          {
            "name": "HPSBMA02391",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=122876677518654\u0026w=2"
          },
          {
            "name": "1021092",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021092"
          },
          {
            "name": "ov-traceservice-rpc-dos(46028)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46028"
          },
          {
            "name": "27054",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27054"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://secunia.com/secunia_research/2007-83/"
          },
          {
            "name": "20081022 Secunia Research: HP OpenView Products Shared Trace Service Denial of Service",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/497648/100/0/threaded"
          },
          {
            "name": "31860",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31860"
          },
          {
            "name": "ADV-2008-2888",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2888"
          },
          {
            "name": "HPSBMA02390",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=122876827120961\u0026w=2"
          },
          {
            "name": "SSRT071481",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=122876827120961\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Shared Trace Service (aka OVTrace) in HP Performance Agent C.04.70 (aka 4.70), HP OpenView Performance Agent C.04.60 and C.04.61, HP Reporter 3.8, and HP OpenView Reporter 3.7 (aka Report 3.70) allows remote attackers to cause a denial of service via an unspecified series of RPC requests (aka Trace Event Messages) that triggers an out-of-bounds memory access, related to an erroneous object reference."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
        "shortName": "flexera"
      },
      "references": [
        {
          "name": "4501",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4501"
        },
        {
          "name": "HPSBMA02391",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=122876677518654\u0026w=2"
        },
        {
          "name": "1021092",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021092"
        },
        {
          "name": "ov-traceservice-rpc-dos(46028)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46028"
        },
        {
          "name": "27054",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27054"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://secunia.com/secunia_research/2007-83/"
        },
        {
          "name": "20081022 Secunia Research: HP OpenView Products Shared Trace Service Denial of Service",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/497648/100/0/threaded"
        },
        {
          "name": "31860",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31860"
        },
        {
          "name": "ADV-2008-2888",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2888"
        },
        {
          "name": "HPSBMA02390",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=122876827120961\u0026w=2"
        },
        {
          "name": "SSRT071481",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=122876827120961\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "PSIRT-CNA@flexerasoftware.com",
          "ID": "CVE-2007-4349",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Shared Trace Service (aka OVTrace) in HP Performance Agent C.04.70 (aka 4.70), HP OpenView Performance Agent C.04.60 and C.04.61, HP Reporter 3.8, and HP OpenView Reporter 3.7 (aka Report 3.70) allows remote attackers to cause a denial of service via an unspecified series of RPC requests (aka Trace Event Messages) that triggers an out-of-bounds memory access, related to an erroneous object reference."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "4501",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4501"
            },
            {
              "name": "HPSBMA02391",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=122876677518654\u0026w=2"
            },
            {
              "name": "1021092",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021092"
            },
            {
              "name": "ov-traceservice-rpc-dos(46028)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46028"
            },
            {
              "name": "27054",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27054"
            },
            {
              "name": "http://secunia.com/secunia_research/2007-83/",
              "refsource": "MISC",
              "url": "http://secunia.com/secunia_research/2007-83/"
            },
            {
              "name": "20081022 Secunia Research: HP OpenView Products Shared Trace Service Denial of Service",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/497648/100/0/threaded"
            },
            {
              "name": "31860",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31860"
            },
            {
              "name": "ADV-2008-2888",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2888"
            },
            {
              "name": "HPSBMA02390",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=122876827120961\u0026w=2"
            },
            {
              "name": "SSRT071481",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=122876827120961\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab",
    "assignerShortName": "flexera",
    "cveId": "CVE-2007-4349",
    "datePublished": "2008-10-23T21:00:00",
    "dateReserved": "2007-08-14T00:00:00",
    "dateUpdated": "2024-08-07T14:53:55.597Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-4420
Vulnerability from cvelistv5
Published
2009-04-13 16:00
Modified
2024-08-07 10:17
Severity ?
Summary
Multiple stack-based buffer overflows in DZIP32.DLL before 5.0.0.8 in DynaZip Max and DZIPS32.DLL before 6.0.0.5 in DynaZip Max Secure; as used in HP OpenView Performance Agent C.04.60, HP Performance Agent C.04.70 and C.04.72, TurboZIP 6.0, and other products; allow user-assisted attackers to execute arbitrary code via a long filename in a ZIP archive during a (1) Fix (aka Repair), (2) Add, (3) Update, or (4) Freshen action, a related issue to CVE-2006-3985.
References
http://www.securitytracker.com/id?1022021vdb-entry, x_refsource_SECTRACK
http://innermedia.com/upgrades.htmlx_refsource_MISC
http://www.securityfocus.com/archive/1/441083mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/19143vdb-entry, x_refsource_BID
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011vendor-advisory, x_refsource_HP
http://osvdb.org/53478vdb-entry, x_refsource_OSVDB
http://vuln.sg/dynazip5007-en.htmlx_refsource_MISC
http://www.securityfocus.com/archive/1/441084mailing-list, x_refsource_BUGTRAQ
http://secunia.com/advisories/21180third-party-advisory, x_refsource_SECUNIA
http://vuln.sg/turbozip6-en.htmlx_refsource_MISC
http://www.vupen.com/english/advisories/2006/2957vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/34659third-party-advisory, x_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011vendor-advisory, x_refsource_HP
http://www.vupen.com/english/advisories/2009/0980vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:17:09.276Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1022021",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022021"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://innermedia.com/upgrades.html"
          },
          {
            "name": "20060725 [vuln.sg] DynaZip DZIP32.DLL/DZIPS32.DLL Buffer Overflow Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/441083"
          },
          {
            "name": "19143",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19143"
          },
          {
            "name": "HPSBMA02396",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011"
          },
          {
            "name": "53478",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/53478"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://vuln.sg/dynazip5007-en.html"
          },
          {
            "name": "20060725 [vuln.sg] TurboZIP ZIP Repair Buffer Overflow Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/441084"
          },
          {
            "name": "21180",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21180"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://vuln.sg/turbozip6-en.html"
          },
          {
            "name": "ADV-2006-2957",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2957"
          },
          {
            "name": "34659",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34659"
          },
          {
            "name": "SSRT080175",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011"
          },
          {
            "name": "ADV-2009-0980",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0980"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-07-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in DZIP32.DLL before 5.0.0.8 in DynaZip Max and DZIPS32.DLL before 6.0.0.5 in DynaZip Max Secure; as used in HP OpenView Performance Agent C.04.60, HP Performance Agent C.04.70 and C.04.72, TurboZIP 6.0, and other products; allow user-assisted attackers to execute arbitrary code via a long filename in a ZIP archive during a (1) Fix (aka Repair), (2) Add, (3) Update, or (4) Freshen action, a related issue to CVE-2006-3985."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-04-16T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1022021",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022021"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://innermedia.com/upgrades.html"
        },
        {
          "name": "20060725 [vuln.sg] DynaZip DZIP32.DLL/DZIPS32.DLL Buffer Overflow Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/441083"
        },
        {
          "name": "19143",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19143"
        },
        {
          "name": "HPSBMA02396",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011"
        },
        {
          "name": "53478",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/53478"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://vuln.sg/dynazip5007-en.html"
        },
        {
          "name": "20060725 [vuln.sg] TurboZIP ZIP Repair Buffer Overflow Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/441084"
        },
        {
          "name": "21180",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21180"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://vuln.sg/turbozip6-en.html"
        },
        {
          "name": "ADV-2006-2957",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2957"
        },
        {
          "name": "34659",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34659"
        },
        {
          "name": "SSRT080175",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011"
        },
        {
          "name": "ADV-2009-0980",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0980"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4420",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple stack-based buffer overflows in DZIP32.DLL before 5.0.0.8 in DynaZip Max and DZIPS32.DLL before 6.0.0.5 in DynaZip Max Secure; as used in HP OpenView Performance Agent C.04.60, HP Performance Agent C.04.70 and C.04.72, TurboZIP 6.0, and other products; allow user-assisted attackers to execute arbitrary code via a long filename in a ZIP archive during a (1) Fix (aka Repair), (2) Add, (3) Update, or (4) Freshen action, a related issue to CVE-2006-3985."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1022021",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022021"
            },
            {
              "name": "http://innermedia.com/upgrades.html",
              "refsource": "MISC",
              "url": "http://innermedia.com/upgrades.html"
            },
            {
              "name": "20060725 [vuln.sg] DynaZip DZIP32.DLL/DZIPS32.DLL Buffer Overflow Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/441083"
            },
            {
              "name": "19143",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19143"
            },
            {
              "name": "HPSBMA02396",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011"
            },
            {
              "name": "53478",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/53478"
            },
            {
              "name": "http://vuln.sg/dynazip5007-en.html",
              "refsource": "MISC",
              "url": "http://vuln.sg/dynazip5007-en.html"
            },
            {
              "name": "20060725 [vuln.sg] TurboZIP ZIP Repair Buffer Overflow Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/441084"
            },
            {
              "name": "21180",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21180"
            },
            {
              "name": "http://vuln.sg/turbozip6-en.html",
              "refsource": "MISC",
              "url": "http://vuln.sg/turbozip6-en.html"
            },
            {
              "name": "ADV-2006-2957",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2957"
            },
            {
              "name": "34659",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34659"
            },
            {
              "name": "SSRT080175",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011"
            },
            {
              "name": "ADV-2009-0980",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0980"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4420",
    "datePublished": "2009-04-13T16:00:00",
    "dateReserved": "2008-10-03T00:00:00",
    "dateUpdated": "2024-08-07T10:17:09.276Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2008-10-23 22:00
Modified
2024-11-21 00:35
Severity ?
Summary
The Shared Trace Service (aka OVTrace) in HP Performance Agent C.04.70 (aka 4.70), HP OpenView Performance Agent C.04.60 and C.04.61, HP Reporter 3.8, and HP OpenView Reporter 3.7 (aka Report 3.70) allows remote attackers to cause a denial of service via an unspecified series of RPC requests (aka Trace Event Messages) that triggers an out-of-bounds memory access, related to an erroneous object reference.
References
PSIRT-CNA@flexerasoftware.comhttp://marc.info/?l=bugtraq&m=122876677518654&w=2
PSIRT-CNA@flexerasoftware.comhttp://marc.info/?l=bugtraq&m=122876827120961&w=2
PSIRT-CNA@flexerasoftware.comhttp://marc.info/?l=bugtraq&m=122876827120961&w=2
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27054Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/secunia_research/2007-83/Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://securityreason.com/securityalert/4501
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/archive/1/497648/100/0/threaded
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/bid/31860Patch
PSIRT-CNA@flexerasoftware.comhttp://www.securitytracker.com/id?1021092
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2008/2888Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/46028
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=122876677518654&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=122876827120961&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=122876827120961&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27054Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2007-83/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/4501
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/497648/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31860Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021092
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2888Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/46028
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:openview_performance_agent:c.04.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "9374AB08-64F6-4376-BF01-652E88A7E050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_performance_agent:c.04.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "15053C63-0407-422A-9E7B-591E336D6121",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_reporter:3.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "380F0F94-E4D6-4630-AC10-C4D8922760A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:performance_agent:4.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B769539-D927-4086-9160-F162488F5337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:reporter:3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BCEDB40-6EC3-4F4F-A2E5-5B223AA58DDF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Shared Trace Service (aka OVTrace) in HP Performance Agent C.04.70 (aka 4.70), HP OpenView Performance Agent C.04.60 and C.04.61, HP Reporter 3.8, and HP OpenView Reporter 3.7 (aka Report 3.70) allows remote attackers to cause a denial of service via an unspecified series of RPC requests (aka Trace Event Messages) that triggers an out-of-bounds memory access, related to an erroneous object reference."
    },
    {
      "lang": "es",
      "value": "El servicio Shared Trace (tambi\u00e9n se conoce como OVTrace) en HP Performance Agent versi\u00f3n C.04.70 (4.70), HP OpenView Performance Agent versiones C.04.60 y C.04.61, HP Reporter versi\u00f3n 3.8 y HP OpenView Reporter versi\u00f3n 3.7 (Informe 3.70), permite a los atacantes remotos causar una denegaci\u00f3n de servicio por medio de una serie no especificada de peticiones RPC (tambi\u00e9n se conoce como Mensajes de Eventos de Rastreo) que desencadena un acceso de memoria fuera de l\u00edmites, relacionado con una referencia de objeto err\u00f3nea."
    }
  ],
  "id": "CVE-2007-4349",
  "lastModified": "2024-11-21T00:35:22.727",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-10-23T22:00:01.027",
  "references": [
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=122876677518654\u0026w=2"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=122876827120961\u0026w=2"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=122876827120961\u0026w=2"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27054"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2007-83/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securityreason.com/securityalert/4501"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/497648/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/31860"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securitytracker.com/id?1021092"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2888"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=122876677518654\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=122876827120961\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=122876827120961\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27054"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2007-83/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4501"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/497648/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/31860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021092"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2888"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46028"
    }
  ],
  "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-04-13 16:30
Modified
2024-11-21 00:51
Severity ?
Summary
Multiple stack-based buffer overflows in DZIP32.DLL before 5.0.0.8 in DynaZip Max and DZIPS32.DLL before 6.0.0.5 in DynaZip Max Secure; as used in HP OpenView Performance Agent C.04.60, HP Performance Agent C.04.70 and C.04.72, TurboZIP 6.0, and other products; allow user-assisted attackers to execute arbitrary code via a long filename in a ZIP archive during a (1) Fix (aka Repair), (2) Add, (3) Update, or (4) Freshen action, a related issue to CVE-2006-3985.
References
cve@mitre.orghttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011Vendor Advisory
cve@mitre.orghttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011Vendor Advisory
cve@mitre.orghttp://innermedia.com/upgrades.html
cve@mitre.orghttp://osvdb.org/53478
cve@mitre.orghttp://secunia.com/advisories/21180Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/34659Vendor Advisory
cve@mitre.orghttp://vuln.sg/dynazip5007-en.htmlExploit
cve@mitre.orghttp://vuln.sg/turbozip6-en.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/441083
cve@mitre.orghttp://www.securityfocus.com/archive/1/441084
cve@mitre.orghttp://www.securityfocus.com/bid/19143Patch
cve@mitre.orghttp://www.securitytracker.com/id?1022021
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2957Vendor Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/0980Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://innermedia.com/upgrades.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/53478
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21180Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34659Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://vuln.sg/dynazip5007-en.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://vuln.sg/turbozip6-en.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/441083
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/441084
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/19143Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022021
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2957Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0980Vendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:openview_performance_agent:c.04.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "9374AB08-64F6-4376-BF01-652E88A7E050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_performance_agent:c.04.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C139A64-A700-404C-97B7-BD209330E1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_performance_agent:c.04.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBABDAE7-CE5A-40A3-967C-C7E69E43C981",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:innermedia:dynazip_max:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A66321F-E234-4F65-A365-0FA4C8B2CF28",
              "versionEndIncluding": "5.0.0.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:innermedia:dynazip_max_secure:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D400AB64-1D9B-4EB9-8834-89A44C0FABDD",
              "versionEndIncluding": "6.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:filestream:turbozip:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "372BDE07-E17C-49D0-8707-740AD5B870A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in DZIP32.DLL before 5.0.0.8 in DynaZip Max and DZIPS32.DLL before 6.0.0.5 in DynaZip Max Secure; as used in HP OpenView Performance Agent C.04.60, HP Performance Agent C.04.70 and C.04.72, TurboZIP 6.0, and other products; allow user-assisted attackers to execute arbitrary code via a long filename in a ZIP archive during a (1) Fix (aka Repair), (2) Add, (3) Update, or (4) Freshen action, a related issue to CVE-2006-3985."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en DZIP32.DLL en versiones anteriores a v5.0.0.8 en DynaZip Max y DZIPS32.DLL en versiones anteriores a v6.0.0.5 e DynaZip Max Secure, cuando son usados en HP OpenView Performance Agent C.04.60, HP Performance Agent C.04.70 y C.04.72, TurboZIP 6.0 y otros productos, permiten a atacantes con la intervenci\u00f3n del usuario ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s un nombre largo de fichero ZIP durante una acci\u00f3n de (1) \"Fix\" (reparar), (2) a\u00f1adir, (3) actualizar o (4) refrescar. Este asunto est\u00e1 relacionado con el CVE-2006-3985."
    }
  ],
  "id": "CVE-2008-4420",
  "lastModified": "2024-11-21T00:51:38.453",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-04-13T16:30:00.203",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://innermedia.com/upgrades.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/53478"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21180"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34659"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://vuln.sg/dynazip5007-en.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://vuln.sg/turbozip6-en.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/441083"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/441084"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1022021"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/2957"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0980"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01622011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://innermedia.com/upgrades.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/53478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/21180"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/34659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://vuln.sg/dynazip5007-en.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://vuln.sg/turbozip6-en.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/441083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/441084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/19143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/2957"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/0980"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-07-01 10:55
Modified
2024-11-21 01:28
Severity ?
Summary
ovbbccb.exe 6.20.50.0 and other versions in HP OpenView Performance Agent 4.70 and 5.0; and Operations Agent 11.0, 8.60.005, 8.60.006, 8.60.007, 8.60.008, 8.60.501, and 8.53; allows remote attackers to delete arbitrary files via a full pathname in the File field in a Register command.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:openview_performance_agent:4.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEFA79F3-E5AD-4C68-AF18-9C5EB7CC8B46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:openview_performance_agent:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF11BCFE-6B7F-44EE-83B9-24DA4035D744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:operations_agent:8.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DCC7E2F-90D5-479F-939E-D4C49BB90A49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:operations_agent:8.60.005:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B21B789-BED5-4881-B76A-BC99402A23DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:operations_agent:8.60.006:*:*:*:*:*:*:*",
              "matchCriteriaId": "936C02A6-426E-4156-99D1-F42F34B17FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:operations_agent:8.60.007:*:*:*:*:*:*:*",
              "matchCriteriaId": "5777744D-D541-4FC7-957B-2A03E9A19DEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:operations_agent:8.60.008:*:*:*:*:*:*:*",
              "matchCriteriaId": "8284C19E-D75F-4CF0-B39A-26449C9827A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:operations_agent:8.60.501:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EDA541-9522-4E4A-8D7A-D7BDDD334890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:operations_agent:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D408D339-7FD3-4523-ABFD-0FA25465EF05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ovbbccb.exe 6.20.50.0 and other versions in HP OpenView Performance Agent 4.70 and 5.0; and Operations Agent 11.0, 8.60.005, 8.60.006, 8.60.007, 8.60.008, 8.60.501, and 8.53; allows remote attackers to delete arbitrary files via a full pathname in the File field in a Register command."
    },
    {
      "lang": "es",
      "value": "ovbbccb.exe versi\u00f3n 6.20.50.0 y otras versiones en OpenView Performance Agent versiones 4.70 y 5.0; y el Operations Agent versiones 11.0, 8.60.005, 8.60.006, 8.60.007, 8.60.008, 8.60.501 y 8.53, de HP; permite a los atacantes remotos eliminar archivos arbitrarios por medio de un nombre de ruta completo en el campo File en un comando Register."
    }
  ],
  "id": "CVE-2011-2608",
  "lastModified": "2024-11-21T01:28:34.967",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-07-01T10:55:02.113",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=131188898632504\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=131188898632504\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45079"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1025715"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/48481"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68269"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=131188898632504\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=131188898632504\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1025715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/48481"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68269"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}