var-200708-0119
Vulnerability from variot
Buffer overflow in ldcconn in Hewlett-Packard (HP) Controller for Cisco Local Director on HP-UX 11.11i allows remote attackers to execute arbitrary code via a long string to TCP port 17781. HP-UX is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. An attacker can exploit this issue to execute arbitrary code with superuser privileges. Successful attacks will completely compromise affected computers. HP-UX 11.11i is vulnerable; other versions may also be affected. HP-UX is a UNIX operating system developed by HP. Remote attackers may use this vulnerability to control the server.
BETA test the new Secunia Personal Software Inspector!
The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors.
Download the free PSI BETA from the Secunia website: https://psi.secunia.com/
TITLE: HP-UX 11.11 ldcconn Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA26373
VERIFY ADVISORY: http://secunia.com/advisories/26373/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From local network
OPERATING SYSTEM: HP-UX 11.x http://secunia.com/product/138/
DESCRIPTION: A vulnerability has been reported in HP-UX, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a boundary error in ldcconn and can be exploited to cause a buffer overflow by sending an overly long string to the service (default port 17781/TCP).
Successful exploitation allows execution of arbitrary code.
The vulnerability is reported in the HP Controller for Cisco Local Director package on HP-UX 11.11i.
SOLUTION: The vendor recommends using another tool as the package has been obsolete since 2002 and is no longer supported.
PROVIDED AND/OR DISCOVERED BY: iDefense Labs
ORIGINAL ADVISORY: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=572
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200708-0119", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "hp-ux", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "11.11i" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "9.00 11.11i" }, { "model": "hp-ux 11.11i", "scope": null, "trust": 0.3, "vendor": "hp", "version": null } ], "sources": [ { "db": "BID", "id": "25227" }, { "db": "JVNDB", "id": "JVNDB-2007-004247" }, { "db": "NVD", "id": "CVE-2007-4241" }, { "db": "CNNVD", "id": "CNNVD-200708-147" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.11i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:local_director:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2007-4241" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "iDEFENSE", "sources": [ { "db": "CNNVD", "id": "CNNVD-200708-147" } ], "trust": 0.6 }, "cve": "CVE-2007-4241", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2007-4241", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-27603", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2007-4241", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200708-147", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-27603", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-27603" }, { "db": "JVNDB", "id": "JVNDB-2007-004247" }, { "db": "NVD", "id": "CVE-2007-4241" }, { "db": "CNNVD", "id": "CNNVD-200708-147" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in ldcconn in Hewlett-Packard (HP) Controller for Cisco Local Director on HP-UX 11.11i allows remote attackers to execute arbitrary code via a long string to TCP port 17781. HP-UX is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. \nAn attacker can exploit this issue to execute arbitrary code with superuser privileges. Successful attacks will completely compromise affected computers. \nHP-UX 11.11i is vulnerable; other versions may also be affected. HP-UX is a UNIX operating system developed by HP. Remote attackers may use this vulnerability to control the server. \n\n----------------------------------------------------------------------\n\nBETA test the new Secunia Personal Software Inspector!\n\nThe Secunia PSI detects installed software on your computer and\ncategorises it as either Insecure, End-of-Life, or Up-To-Date. \nEffectively enabling you to focus your attention on software\ninstallations where more secure versions are available from the\nvendors. \n\nDownload the free PSI BETA from the Secunia website:\nhttps://psi.secunia.com/\n\n----------------------------------------------------------------------\n\nTITLE:\nHP-UX 11.11 ldcconn Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA26373\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/26373/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom local network\n\nOPERATING SYSTEM:\nHP-UX 11.x\nhttp://secunia.com/product/138/\n\nDESCRIPTION:\nA vulnerability has been reported in HP-UX, which can be exploited by\nmalicious people to compromise a vulnerable system. \n\nThe vulnerability is caused due to a boundary error in ldcconn and\ncan be exploited to cause a buffer overflow by sending an overly long\nstring to the service (default port 17781/TCP). \n\nSuccessful exploitation allows execution of arbitrary code. \n\nThe vulnerability is reported in the HP Controller for Cisco Local\nDirector package on HP-UX 11.11i. \n\nSOLUTION:\nThe vendor recommends using another tool as the package has been\nobsolete since 2002 and is no longer supported. \n\nPROVIDED AND/OR DISCOVERED BY:\niDefense Labs\n\nORIGINAL ADVISORY:\nhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=572\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-4241" }, { "db": "JVNDB", "id": "JVNDB-2007-004247" }, { "db": "BID", "id": "25227" }, { "db": "VULHUB", "id": "VHN-27603" }, { "db": "PACKETSTORM", "id": "58393" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2007-4241", "trust": 2.8 }, { "db": "BID", "id": "25227", "trust": 2.0 }, { "db": "SECUNIA", "id": "26373", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2007-2813", "trust": 1.7 }, { "db": "SECTRACK", "id": "1018524", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2007-004247", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200708-147", "trust": 0.7 }, { "db": "IDEFENSE", "id": "20070807 HEWLETT-PACKARD HP-UX REMOTE LDCCONN BUFFER OVERFLOW VULNERABILITY", "trust": 0.6 }, { "db": "XF", "id": "35847", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-27603", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "58393", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-27603" }, { "db": "BID", "id": "25227" }, { "db": "JVNDB", "id": "JVNDB-2007-004247" }, { "db": "PACKETSTORM", "id": "58393" }, { "db": "NVD", "id": "CVE-2007-4241" }, { "db": "CNNVD", "id": "CNNVD-200708-147" } ] }, "id": "VAR-200708-0119", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-27603" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:53:05.175000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.hp.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-004247" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2007-4241" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=572" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/25227" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1018524" }, { "trust": 1.7, "url": "http://secunia.com/advisories/26373" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2007/2813" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35847" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4241" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4241" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/35847" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2007/2813" }, { "trust": 0.3, "url": "http://www.hp.com/products1/unix/" }, { "trust": 0.3, "url": "/archive/1/475766" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "https://psi.secunia.com/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/26373/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/138/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-27603" }, { "db": "BID", "id": "25227" }, { "db": "JVNDB", "id": "JVNDB-2007-004247" }, { "db": "PACKETSTORM", "id": "58393" }, { "db": "NVD", "id": "CVE-2007-4241" }, { "db": "CNNVD", "id": "CNNVD-200708-147" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-27603" }, { "db": "BID", "id": "25227" }, { "db": "JVNDB", "id": "JVNDB-2007-004247" }, { "db": "PACKETSTORM", "id": "58393" }, { "db": "NVD", "id": "CVE-2007-4241" }, { "db": "CNNVD", "id": "CNNVD-200708-147" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-08-08T00:00:00", "db": "VULHUB", "id": "VHN-27603" }, { "date": "2007-08-07T00:00:00", "db": "BID", "id": "25227" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-004247" }, { "date": "2007-08-10T02:01:07", "db": "PACKETSTORM", "id": "58393" }, { "date": "2007-08-08T22:17:00", "db": "NVD", "id": "CVE-2007-4241" }, { "date": "2007-08-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200708-147" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-29T00:00:00", "db": "VULHUB", "id": "VHN-27603" }, { "date": "2015-05-07T17:36:00", "db": "BID", "id": "25227" }, { "date": "2012-09-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2007-004247" }, { "date": "2017-07-29T01:32:48.160000", "db": "NVD", "id": "CVE-2007-4241" }, { "date": "2007-08-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200708-147" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200708-147" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP-UX upper Cisco Local Director of HP Controller Vulnerable to buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2007-004247" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200708-147" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.