{"vuid":"VU#137024","idnumber":"137024","name":"Compaq web-enabled management software contains buffer overflow in authentication username","keywords":["Compaq","web-enabled management","Insight Manager","HTTP","SSRT0705","tcp/2301","cpqlogin.htm"],"overview":"The Compaq web-enabled management software contains a buffer overflow in the authentication component of the product. Remote intruders may be able to execute arbitrary code with privileges on affected systems. Many Compaq products are affected, from personal computers to commercial UNIX operating systems.","clean_desc":"The Compaq web-enabled management software allows system management information to be accessed through a web interface. This web interface is secured by an login dialog accessible on port 2301 of the system running the vulnerable software. The authentication code has a buffer overflow in the username field, allowing a remote intruder to execute arbitrary code with the privileges of the Compaq web-enabled management software. This often includes elevated privileges (e.g., root or Administrator). Affected Compaq products include those running Microsoft Windows 9x, Windows NT, Windows 2000, NetWare, SCO Open Server, SCO UnixWare 7, RedHat 6.2, RedHat 7.0, Tru64Unix, and OpenVMS. Web-enabled management software is also supported for Compaq storage products. Compaq has produced a security advisory describing this problem at http://www.compaq.com/products/servers/management/agentsecurity.html","impact":"A remote intruder may be able to execute arbitrary code with privileges on systems running the vulnerable software.","resolution":"Apply a Patch Apply a patch from your vendor. Information about patches to correct this problem is available in the Compaq security advisory. The patches described in Compaq security advisory SSRT0715 and VU#991240 will correct this vulnerability and another.","workarounds":"Disable the Web-Enabled Management Software You can prevent this vulnerability from being exploited by disabling the web-enabled management software. Block Ports 2301 and 280 at Your Perimeter Port 2301 (the device management port) is the port used to access the vulnerable code. Blocking access to this port from untrusted sources may reduce the risk of exploitation. You may also wish to block port 280 (the Compaq Insight Manager XE port).","sysaffected":"","thanks":"","author":"This document was written by Cory F. Cohen.","public":["http://www.compaq.com/products/servers/management/agentsecurity.html","http://www.securityfocus.com/bid/2200","http://www.ciac.org/ciac/bulletins/l-042.shtml"],"cveids":["CVE-2001-0134"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-01-12T01:13:07Z","publicdate":"2001-01-16T00:00:00Z","datefirstpublished":"2001-04-06T21:11:17Z","dateupdated":"2001-08-30T20:09:43Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"2","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"19","cam_easeofexploitation":"15","cam_attackeraccessrequired":"18","cam_scorecurrent":"38.9559375","cam_scorecurrentwidelyknown":"38.9559375","cam_scorecurrentwidelyknownexploited":"64.9265625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":38.9559375,"vulnote":null}