CVE-2016-4395

Published on: 10/28/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:26:59 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Certain versions of System Management Homepage from Hp contain the following vulnerability:

HPE System Management Homepage before v7.6 allows remote attackers to have an unspecified impact via unknown vectors, related to a "Buffer Overflow" issue.

  • CVE-2016-4395 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.
  • Affected Vendor/Software: URL Logo HPE - HPE System Management Homepage before v7.6 version HPE System Management Homepage before v7.6

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE HIGH NONE

CVSS2 Score: 7.8 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE COMPLETE NONE

CVE References

Description Tags Link
[R1] HP System Management Homepage (SMH) Multiple Remote Stack Buffer Overflows - Research Advisory | Tenable® www.tenable.com
text/html
URL Logo MISC www.tenable.com/security/research/tra-2016-32
Document Display | HPE Support Center h20566.www2.hpe.com
text/html
URL Logo CONFIRM h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
HP System Management Homepage Multiple Security Vulnerabilities cve.report (archive)
text/html
URL Logo BID 93961
Zero Day Initiative www.zerodayinitiative.com
text/html
URL Logo MISC www.zerodayinitiative.com/advisories/ZDI-16-587
HPE Support document - HPE Support Center Vendor Advisory
h20564.www2.hpe.com
text/html
URL Logo CONFIRM h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05320149

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationHpSystem Management HomepageAllAllAllAll
  • cpe:2.3:a:hp:system_management_homepage:*:*:*:*:*:*:*:*: