/// File Name: |
hp_omniinet_2.rb.txt |
Description:
|
This Metasploit module exploits a stack-based buffer overflow in the Hewlett-Packard OmniInet NT Service. By sending a specially crafted MSG_PROTOCOL (0x010b) packet, a remote attacker may be able to execute arbitrary code with elevated privileges. This service is installed with HP OpenView Data Protector, HP Application Recovery Manager and potentially other products. This exploit has been tested against versions 6.1, 6.0, and 5.50 of Data Protector. and versions 6.0 and 6.1 of Application Recovery Manager. NOTE: There are actually two consecutive wcscpy() calls in the program (which may be why ZDI considered them two separate issues). However, this module only exploits the second one.
| Author: | EgiX,jduck,riaf | Homepage: | http://www.metasploit.com | File Size: | 5265 | Related OSVDB(s): | 60852 | Related CVE(s): | CVE-2009-3844 | Last Modified: | Jan 7 01:00:00 2010 |
MD5 Checksum: | b3687ed374a55ab5d0525a4d749456b8 |
|