A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard OpenView Network Node Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within the webappmon.exe CGI application. This process copies the Host header from HTTP requests into a fixed-length buffer located in the .DATA section via a call to strcat(). By specifying a string length within a certain range this buffer can be overflowed leading to arbitrary code execution.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/83664/TPTI-09-10.txt
Source: https://packetstormsecurity.com/files/83664/HP-OpenView-NNM-webappmon.exe-CGI-Host-Header-Buffer-Overflow.html

