var-200702-0025
Vulnerability from variot

Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll. Authentication is not required to exploit this vulnerability.The specific flaw exists within the process magentproc.exe that binds to TCP port 54345. When parsing packets containing an overly long 'server_ip_name' field, an exploitable stack overflow may be triggered due to an an inline strcpy() within the library mchan.dll. Multiple Mercury products are prone to a stack-based buffer-overflow vulnerability because the applications fail to bounds-check user-supplied data before copying it into an insufficiently sized buffer. Failed exploit attempts will result in a denial of service. HP Mercury is an IT management software developed by Mercury acquired by HP. Authentication is not required to exploit this vulnerability.

-- Vendor Response: Hewlett-Packard has issued an update to correct this vulnerability. More details can be found at:

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854250

-- Disclosure Timeline: 2006.10.27 - Vulnerability reported to vendor 2006.11.10 - Digital Vaccine released to TippingPoint customers 2007.02.08 - Coordinated public release of advisory

-- Credit: This vulnerability was discovered by Eric DETOISIEN.

-- About the Zero Day Initiative (ZDI): Established by TippingPoint, a division of 3Com, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at:

http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is used. 3Com does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, 3Com provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, 3Com provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product.


Secunia is proud to announce the availability of the Secunia Software Inspector.

The Secunia Software Inspector is a free service that detects insecure versions of software that you may have installed in your system. When insecure versions are detected, the Secunia Software Inspector also provides thorough guidelines for updating the software to the latest secure version from the vendor.

Try it out online: http://secunia.com/software_inspector/


TITLE: HP Mercury Products Long "server_ip_name" Buffer Overflow

SECUNIA ADVISORY ID: SA24112

VERIFY ADVISORY: http://secunia.com/advisories/24112/

CRITICAL: Moderately critical

IMPACT: System access

WHERE:

From local network

SOFTWARE: Mercury LoadRunner Agent 8.x http://secunia.com/product/13450/ Mercury Monitor over Firewall 8.x http://secunia.com/product/13449/ Mercury Performance Center Agent 8.x http://secunia.com/product/13448/

DESCRIPTION: A vulnerability has been reported in various HP Mercury products, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within MCHAN.DLL when parsing packets sent to MAGENTPROC.EXE on port 54345/TCP.

-- Mercury LoadRunner Agent 8.1 FP4 -- NT: http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/c337892f322b2311 c22572670060b795?OpenDocument

AIX, HP, Solaris, Linux: http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/6d7ce88c0d5c4b36 c225726a004a94a2?OpenDocument

-- Mercury LoadRunner Agent 8.1 SP1, FP1, FP2, FP3 -- Update to 8.1 FP4 and apply patches listed above.

-- Mercury LoadRunner Agent 8.1 GA -- NT: http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/7cd789640e496c34 c225726700613486?OpenDocument

AIX, HP, Solaris, Linux: http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/f2de896609dd7efb c225726a004af033?OpenDocument

-- Mercury LoadRunner Agent 8.0 GA -- NT: http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/fa4a48afea2f8198 c22572670061bbe7?OpenDocument

AIX, HP, Solaris, Linux: http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/5de153e30789fa4a c225726a004b2354?OpenDocument

-- Mercury Performance Center Agent 8.1 FP4 -- NT: http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/ae5d9a48a163fbb4 c225726a004c7831?OpenDocument

AIX, HP, Solaris, Linux: http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/34e894d8d8a1b941 c225726a004ff335?OpenDocument

-- Mercury Performance Center Agent 8.1 FP1, FP2, FP3 -- Update to version 8.1 FP4 and apply patches listed above.

-- Mercury Performance Center Agent 8.1 GA -- NT: http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/0831f8b0bd9d9619 c225726a004cf7fe?OpenDocument

AIX, HP, Solaris, Linux: http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/a7333913152e65e1 c225726a005035e4?OpenDocument

-- Mercury Performance Center Agent 8.0 GA -- Update to version 8.1 GA and apply patches listed above.

-- Mercury Monitor over Firewall 8.1 -- NT: http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/c9b9924b3206614f c225726a004ded7d?OpenDocument

PROVIDED AND/OR DISCOVERED BY: Discovered by Eric Detoisien and reported via ZDI.

ORIGINAL ADVISORY: HPSBGN02187 SSRT061280: http://www5.itrc.hp.com/service/cki/docDisplay.do?docId=c00854250

ZDI: http://www.zerodayinitiative.com/advisories/ZDI-07-007.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200702-0025",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mercury performance center agent",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury performance center agent",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "hp",
        "version": "8.0"
      },
      {
        "model": "mercury monitor over firewall",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury loadrunner agent",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury loadrunner agent",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "8.0"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": "mercury loadrunner agent",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "8.0 and  8.1"
      },
      {
        "model": "mercury monitor over firewall",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "8.1"
      },
      {
        "model": "mercury performance center agent",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "8.0 and  8.1"
      },
      {
        "model": "performance center monitor over firewall loadrunner",
        "scope": null,
        "trust": 0.7,
        "vendor": "mercury",
        "version": null
      },
      {
        "model": "mercury performance center agent fp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury performance center agent fp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury performance center agent fp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury performance center agent fp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury loadrunner agent sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury loadrunner agent ga",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury loadrunner agent fp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury loadrunner agent fp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury loadrunner agent fp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury loadrunner agent fp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.1"
      },
      {
        "model": "mercury loadrunner agent ga",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "8.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.11"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#303012"
      },
      {
        "db": "ZDI",
        "id": "ZDI-07-007"
      },
      {
        "db": "BID",
        "id": "22487"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003262"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0446"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-170"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:hp:mercury_performance_center_agent:8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hp:mercury_loadrunner_agent:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hp:mercury_loadrunner_agent:8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hp:mercury_monitor_over_firewall:8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:hp:mercury_performance_center_agent:8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0446"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Eric DETOISIEN",
    "sources": [
      {
        "db": "ZDI",
        "id": "ZDI-07-007"
      }
    ],
    "trust": 0.7
  },
  "cve": "CVE-2007-0446",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2007-0446",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-23808",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2007-0446",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#303012",
            "trust": 0.8,
            "value": "10.31"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200702-170",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-23808",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2007-0446",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#303012"
      },
      {
        "db": "VULHUB",
        "id": "VHN-23808"
      },
      {
        "db": "VULMON",
        "id": "CVE-2007-0446"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003262"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0446"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-170"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll. Authentication is not required to exploit this vulnerability.The specific flaw exists within the process magentproc.exe that binds to TCP port 54345. When parsing packets containing an overly long \u0027server_ip_name\u0027 field, an exploitable stack overflow may be triggered due to an an inline strcpy() within the library mchan.dll. Multiple Mercury products are prone to a stack-based buffer-overflow vulnerability because the applications fail to bounds-check user-supplied data before copying it into an insufficiently sized buffer. Failed exploit attempts will result in a denial of service. HP Mercury is an IT management software developed by Mercury acquired by HP. \nAuthentication is not required to exploit this vulnerability. \n\n-- Vendor Response:\nHewlett-Packard has issued an update to correct this vulnerability. More\ndetails can be found at:\n\nhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00854250\n\n-- Disclosure Timeline:\n2006.10.27 - Vulnerability reported to vendor\n2006.11.10 - Digital Vaccine released to TippingPoint customers\n2007.02.08 - Coordinated public release of advisory\n\n-- Credit:\nThis vulnerability was discovered by Eric DETOISIEN. \n\n-- About the Zero Day Initiative (ZDI):\nEstablished by TippingPoint, a division of 3Com, The Zero Day Initiative\n(ZDI) represents a best-of-breed model for rewarding security\nresearchers for responsibly disclosing discovered vulnerabilities. \n\nResearchers interested in getting paid for their security research\nthrough the ZDI can find more information and sign-up at:\n\n    http://www.zerodayinitiative.com\n\nThe ZDI is unique in how the acquired vulnerability information is used. \n3Com does not re-sell the vulnerability details or any exploit code. \nInstead, upon notifying the affected product vendor, 3Com provides its\ncustomers with zero day protection through its intrusion prevention\ntechnology. Explicit details regarding the specifics of the\nvulnerability are not exposed to any parties until an official vendor\npatch is publicly available. Furthermore, with the altruistic aim of\nhelping to secure a broader user base, 3Com provides this vulnerability\ninformation confidentially to security vendors (including competitors)\nwho have a vulnerability protection or mitigation product. \n\n----------------------------------------------------------------------\n\nSecunia is proud to announce the availability of the Secunia Software\nInspector. \n\nThe Secunia Software Inspector is a free service that detects insecure\nversions of software that you may have installed in your system. When\ninsecure versions are detected, the Secunia Software Inspector also\nprovides thorough guidelines for updating the software to the latest\nsecure version from the vendor. \n\nTry it out online:\nhttp://secunia.com/software_inspector/\n\n----------------------------------------------------------------------\n\nTITLE:\nHP Mercury Products Long \"server_ip_name\" Buffer Overflow\n\nSECUNIA ADVISORY ID:\nSA24112\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/24112/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nMercury LoadRunner Agent 8.x\nhttp://secunia.com/product/13450/\nMercury Monitor over Firewall 8.x\nhttp://secunia.com/product/13449/\nMercury Performance Center Agent 8.x\nhttp://secunia.com/product/13448/\n\nDESCRIPTION:\nA vulnerability has been reported in various HP Mercury products,\nwhich can be exploited by malicious people to compromise a vulnerable\nsystem. \n\nThe vulnerability is caused due to a boundary error within MCHAN.DLL\nwhen parsing packets sent to MAGENTPROC.EXE on port 54345/TCP. \n\n-- Mercury LoadRunner Agent 8.1 FP4 --\nNT:\nhttp://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/c337892f322b2311\nc22572670060b795?OpenDocument\n\nAIX, HP, Solaris, Linux:\nhttp://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/6d7ce88c0d5c4b36\nc225726a004a94a2?OpenDocument\n\n-- Mercury LoadRunner Agent 8.1 SP1, FP1, FP2, FP3 --\nUpdate to 8.1 FP4 and apply patches listed above. \n\n-- Mercury LoadRunner Agent 8.1 GA --\nNT:\nhttp://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/7cd789640e496c34\nc225726700613486?OpenDocument\n\nAIX, HP, Solaris, Linux:\nhttp://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/f2de896609dd7efb\nc225726a004af033?OpenDocument\n\n-- Mercury LoadRunner Agent 8.0 GA --\nNT:\nhttp://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/fa4a48afea2f8198\nc22572670061bbe7?OpenDocument\n\nAIX, HP, Solaris, Linux:\nhttp://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/5de153e30789fa4a\nc225726a004b2354?OpenDocument\n\n-- Mercury Performance Center Agent 8.1 FP4 --\nNT:\nhttp://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/ae5d9a48a163fbb4\nc225726a004c7831?OpenDocument\n\nAIX, HP, Solaris, Linux:\nhttp://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/34e894d8d8a1b941\nc225726a004ff335?OpenDocument\n\n-- Mercury Performance Center Agent 8.1 FP1, FP2, FP3 --\nUpdate to version 8.1 FP4 and apply patches listed above. \n\n-- Mercury Performance Center Agent 8.1 GA --\nNT:\nhttp://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/0831f8b0bd9d9619\nc225726a004cf7fe?OpenDocument\n\nAIX, HP, Solaris, Linux:\nhttp://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/a7333913152e65e1\nc225726a005035e4?OpenDocument\n\n-- Mercury Performance Center Agent 8.0 GA --\nUpdate to version 8.1 GA and apply patches listed above. \n\n-- Mercury Monitor over Firewall 8.1 --\nNT:\nhttp://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/c9b9924b3206614f\nc225726a004ded7d?OpenDocument\n\nPROVIDED AND/OR DISCOVERED BY:\nDiscovered by Eric Detoisien and reported via ZDI. \n\nORIGINAL ADVISORY:\nHPSBGN02187 SSRT061280:\nhttp://www5.itrc.hp.com/service/cki/docDisplay.do?docId=c00854250\n\nZDI:\nhttp://www.zerodayinitiative.com/advisories/ZDI-07-007.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0446"
      },
      {
        "db": "CERT/CC",
        "id": "VU#303012"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003262"
      },
      {
        "db": "ZDI",
        "id": "ZDI-07-007"
      },
      {
        "db": "BID",
        "id": "22487"
      },
      {
        "db": "VULHUB",
        "id": "VHN-23808"
      },
      {
        "db": "VULMON",
        "id": "CVE-2007-0446"
      },
      {
        "db": "PACKETSTORM",
        "id": "54331"
      },
      {
        "db": "PACKETSTORM",
        "id": "54298"
      }
    ],
    "trust": 3.6
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-23808",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-23808"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "ZDI",
        "id": "ZDI-07-007",
        "trust": 3.8
      },
      {
        "db": "CERT/CC",
        "id": "VU#303012",
        "trust": 3.7
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0446",
        "trust": 3.7
      },
      {
        "db": "SECUNIA",
        "id": "24112",
        "trust": 2.8
      },
      {
        "db": "SECTRACK",
        "id": "1017613",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "22487",
        "trust": 2.1
      },
      {
        "db": "OSVDB",
        "id": "33132",
        "trust": 1.8
      },
      {
        "db": "SECTRACK",
        "id": "1017611",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1017612",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2007-0535",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003262",
        "trust": 0.8
      },
      {
        "db": "ZDI_CAN",
        "id": "ZDI-CAN-112",
        "trust": 0.7
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-170",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20070208 ZDI-07-007: HP MERCURY LOADRUNNER AGENT STACK OVERFLOW VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "CIAC",
        "id": "R-123",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "32390",
        "trust": 0.6
      },
      {
        "db": "HP",
        "id": "HPSBGN02187",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "54331",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-23808",
        "trust": 0.1
      },
      {
        "db": "VUPEN",
        "id": "2007/0535",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2007-0446",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "54298",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#303012"
      },
      {
        "db": "ZDI",
        "id": "ZDI-07-007"
      },
      {
        "db": "VULHUB",
        "id": "VHN-23808"
      },
      {
        "db": "VULMON",
        "id": "CVE-2007-0446"
      },
      {
        "db": "BID",
        "id": "22487"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003262"
      },
      {
        "db": "PACKETSTORM",
        "id": "54331"
      },
      {
        "db": "PACKETSTORM",
        "id": "54298"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0446"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-170"
      }
    ]
  },
  "id": "VAR-200702-0025",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-23808"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:25:48.061000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Mercury LoadRunner Agent",
        "trust": 0.8,
        "url": "http://www.hp.com/country/us/en/solutions/leb.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003262"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-0446"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://www.zerodayinitiative.com/advisories/zdi-07-007.html"
      },
      {
        "trust": 3.0,
        "url": "http://www.kb.cert.org/vuls/id/303012"
      },
      {
        "trust": 2.6,
        "url": "http://www.ciac.org/ciac/bulletins/r-123.shtml"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/22487"
      },
      {
        "trust": 1.9,
        "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c00854250"
      },
      {
        "trust": 1.8,
        "url": "http://osvdb.org/33132"
      },
      {
        "trust": 1.8,
        "url": "http://securitytracker.com/id?1017611"
      },
      {
        "trust": 1.8,
        "url": "http://securitytracker.com/id?1017612"
      },
      {
        "trust": 1.8,
        "url": "http://securitytracker.com/id?1017613"
      },
      {
        "trust": 1.8,
        "url": "http://secunia.com/advisories/24112"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/459505/100/0/threaded"
      },
      {
        "trust": 1.2,
        "url": "http://www.vupen.com/english/advisories/2007/0535"
      },
      {
        "trust": 1.2,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32390"
      },
      {
        "trust": 0.9,
        "url": "http://secunia.com/advisories/24112/"
      },
      {
        "trust": 0.8,
        "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c00854250\u0026jumpid=reg_r1002_usen"
      },
      {
        "trust": 0.8,
        "url": "http://securitytracker.com/alerts/2007/feb/1017613.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0446"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0446"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/32390"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/459505/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2007/0535"
      },
      {
        "trust": 0.3,
        "url": "http://h71028.www7.hp.com/enterprise/cache/447066-0-0-0-121.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/459496"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "http://www.tippingpoint.com"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2007-0446"
      },
      {
        "trust": 0.1,
        "url": "http://www.zerodayinitiative.com"
      },
      {
        "trust": 0.1,
        "url": "http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/a7333913152e65e1"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13449/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/software_inspector/"
      },
      {
        "trust": 0.1,
        "url": "http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/c9b9924b3206614f"
      },
      {
        "trust": 0.1,
        "url": "http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/f2de896609dd7efb"
      },
      {
        "trust": 0.1,
        "url": "http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/6d7ce88c0d5c4b36"
      },
      {
        "trust": 0.1,
        "url": "http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/0831f8b0bd9d9619"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/5de153e30789fa4a"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13448/"
      },
      {
        "trust": 0.1,
        "url": "http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/c337892f322b2311"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/13450/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/fa4a48afea2f8198"
      },
      {
        "trust": 0.1,
        "url": "http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/7cd789640e496c34"
      },
      {
        "trust": 0.1,
        "url": "http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/34e894d8d8a1b941"
      },
      {
        "trust": 0.1,
        "url": "http://www5.itrc.hp.com/service/cki/docdisplay.do?docid=c00854250"
      },
      {
        "trust": 0.1,
        "url": "http://webnotes.merc-int.com/patches.nsf/c4d68388a23535dc422567d0004bbae2/ae5d9a48a163fbb4"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#303012"
      },
      {
        "db": "VULHUB",
        "id": "VHN-23808"
      },
      {
        "db": "VULMON",
        "id": "CVE-2007-0446"
      },
      {
        "db": "BID",
        "id": "22487"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003262"
      },
      {
        "db": "PACKETSTORM",
        "id": "54331"
      },
      {
        "db": "PACKETSTORM",
        "id": "54298"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0446"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-170"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#303012"
      },
      {
        "db": "ZDI",
        "id": "ZDI-07-007"
      },
      {
        "db": "VULHUB",
        "id": "VHN-23808"
      },
      {
        "db": "VULMON",
        "id": "CVE-2007-0446"
      },
      {
        "db": "BID",
        "id": "22487"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2007-003262"
      },
      {
        "db": "PACKETSTORM",
        "id": "54331"
      },
      {
        "db": "PACKETSTORM",
        "id": "54298"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-0446"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-170"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-02-26T00:00:00",
        "db": "CERT/CC",
        "id": "VU#303012"
      },
      {
        "date": "2007-02-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-07-007"
      },
      {
        "date": "2007-02-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-23808"
      },
      {
        "date": "2007-02-08T00:00:00",
        "db": "VULMON",
        "id": "CVE-2007-0446"
      },
      {
        "date": "2007-02-08T00:00:00",
        "db": "BID",
        "id": "22487"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-003262"
      },
      {
        "date": "2007-02-13T05:56:19",
        "db": "PACKETSTORM",
        "id": "54331"
      },
      {
        "date": "2007-02-13T00:06:32",
        "db": "PACKETSTORM",
        "id": "54298"
      },
      {
        "date": "2007-02-08T23:28:00",
        "db": "NVD",
        "id": "CVE-2007-0446"
      },
      {
        "date": "2007-02-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200702-170"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2007-03-01T00:00:00",
        "db": "CERT/CC",
        "id": "VU#303012"
      },
      {
        "date": "2007-02-08T00:00:00",
        "db": "ZDI",
        "id": "ZDI-07-007"
      },
      {
        "date": "2018-10-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-23808"
      },
      {
        "date": "2018-10-16T00:00:00",
        "db": "VULMON",
        "id": "CVE-2007-0446"
      },
      {
        "date": "2007-02-26T23:06:00",
        "db": "BID",
        "id": "22487"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2007-003262"
      },
      {
        "date": "2018-10-16T16:32:38.010000",
        "db": "NVD",
        "id": "CVE-2007-0446"
      },
      {
        "date": "2007-02-13T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200702-170"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "54331"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-170"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "HP Mercury products vulnerable to buffer overflow",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#303012"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200702-170"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.