{"vuid":"VU#952171","idnumber":"952171","name":"Hewlett Packard OpenView and Tivoli NetView do not adequately validate SNMP trap arguments","keywords":["Tivoli","netview","HP","Hewlett Packard OpenView Network Node Manager","NNM","trap","snmptrap","ovactiond","trapd.conf","user bin","privilege elevation"],"overview":"Hewlett Packard's (HP) OpenView and Tivoli NetView are system management software packages. There is a vulnerability a component of these packages, ovactiond, that allows intruders to execute arbitrary commands as user bin. This may subsequently lead to a root compromise.","clean_desc":"HP OpenView and Tivoli NetView are set of tools to manage large networks. Part of OpenView and NetView is a daemon called ovactiond, which is the SNMP trap and event handler. It is possible for an intruder to execute arbitrary commands by sending a malicious message to a vulnerable version of ovactiond. These commands run with the privileges of the ovactiond process, typically bin on Unix systems, and SYSTEM on Windows NT/2000. Often it is possible to use this access to gain root access on Unix systems. An exploit is publicly available. Note that Tivoli NetView is not vulnerable via the default configuration, however, it is likely that customized configurations are vulnerable  HP is vulnerable by the default configuration. For more information, see HP Security Bulletin HPSBUX0106-154 and http://www.tivoli.com/support/. It has been confirmed with HP that the patch referenced on Security Focus for OpenView Version 5.01 is only for Version 6.1.","impact":"An intruder can execute arbitrary commands with the privileges of the ovactiond process, typically bin on Unix systems, and SYSTEM on Window NT/2000 systems.","resolution":"Apply patches from your vendor as appropriate. HP has released HP Security Bulletin HPSBUX0106-154. Tivoli has information posted on http://www.tivoli.com/support/.","workarounds":"","sysaffected":"","thanks":"Our thanks to Milo G. van der Zee, who reported this problem to us and to Hewlett-Packard for the information contained in their advisory.","author":"This document was written by Jason Rafail.","public":["http://us-support.external.hp.com/cki/bin/doc.pl/screen=ckiDisplayDocument?docId=200000055277985","http://www.tivoli.com/support/","http://www.securityfocus.com/bid/2845"],"cveids":["CVE-2001-0552"],"certadvisory":"CA-2001-24","uscerttechnicalalert":null,"datecreated":"2001-06-14T14:27:13Z","publicdate":"2001-06-08T00:00:00Z","datefirstpublished":"2001-06-21T16:20:51Z","dateupdated":"2001-09-06T15:57:16Z","revision":18,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"14","cam_impact":"19","cam_easeofexploitation":"20","cam_attackeraccessrequired":"15","cam_scorecurrent":"44.8875","cam_scorecurrentwidelyknown":"44.8875","cam_scorecurrentwidelyknownexploited":"74.8125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":44.8875,"vulnote":null}