vendor:
Application Recovery Manager
by:
EgiX
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Application Recovery Manager
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: YES
Related CWE: CVE-2009-3884
CPE: a:hewlett_packard:application_recovery_manager
Metasploit:
https://www.rapid7.com/db/vulnerabilities/apple-java-cve-2009-3884/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0002-3-java-jre-security-update-cve-2009-3884/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0005-cve-2009-3884/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2009-3884/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2009-3884/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2009-3884/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-1571/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-1584/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-1560/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-1662/
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=42431, https://www.infosecmatter.com/nessus-plugin-library/?id=53539, https://www.infosecmatter.com/nessus-plugin-library/?id=42828, https://www.infosecmatter.com/nessus-plugin-library/?id=67075, https://www.infosecmatter.com/nessus-plugin-library/?id=67960, https://www.infosecmatter.com/nessus-plugin-library/?id=42921, https://www.infosecmatter.com/nessus-plugin-library/?id=45386, https://www.infosecmatter.com/nessus-plugin-library/?id=42926, https://www.infosecmatter.com/nessus-plugin-library/?id=46176, https://www.infosecmatter.com/nessus-plugin-library/?id=42806
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009
HP Application Recovery Manager (OmniInet.exe) Buffer Overflow
This module exploits a stack-based buffer overflow in HP Application Recovery Manager OmniInet daemon. By sending a specially crafted MSG_PROTOCOL packet, a remote attacker may be able to execute arbitrary code.
Mitigation:
Ensure that the application is up to date with the latest security patches and updates.