HP-UX Vue three.0 permits local consumer to obtain root privileges hp-vue (2284) High Chance ,
Windows 7 Key
Description:
A vulnerability in Vue in HP-UX programs could enable a neighborhood attacker to realize superuser privileges.
Consequences:
Gain Privileges
Remedy:
This concern was resolved by two sets of patches from two various Hewlett-Packard Security Bulletins:
HPSBUX9404-008: Use patch PHSS_4055 for HP9000 Sequence 300/400 or patch PHSS_4038 for HP9000 Series 700/800. See References. HPSBUX9504-027. Apply patch PHSS_4055 for HP9000 Sequence 300/400 or patch PHSS_4066 for HP9000 Series 700/800. See References.
References:
CIAC Info Bulletin E-23b: Vulnerability in HP-UX techniques with HP Vue 3.0. Hewlett-Packard Firm Protection Bulletin HPSBUX9404-008: Security Vulnerability in Vue three.0. Hewlett-Packard Organization Security Bulletin HPSBUX9504-027: Safety Vulnerability in HP VUE3.0. (From SecurityFocus archive.) CVE-1999-1134: Vulnerability in Vue 3.0 in HP 9.x makes it possible for nearby users to achieve root privileges, as fixed by PHSS_4038,
Microsoft Office 2007 Professional, PHSS_4055, and PHSS_4066. CVE-1999-1135: Vulnerability in VUE three.0 in HP 9.x makes it possible for nearby consumers to gain root privileges,
Office 2010 Professional, as fixed by PHSS_4994 and PHSS_5438.
Platforms Affected:
HP HP-UX nine.00 HP HP-UX nine.01 HP HP-UX nine.03 HP HP-UX nine.04 HP HP-UX nine.05 HP HP-UX nine.06 HP HP-UX nine.07 HP HP-UX 9.08 HP HP-UX 9.09 HP HP-UX 9.ten
Reported:
Apr 20,
Windows 7 Download, 1994
The info inside of this database may well adjust with out discover. Use of this information constitutes acceptance for use in an AS IS situation. There are no warranties, implied or in any other case,
Windows 7 Ultimate, regarding this info or its use. Any utilization of this data is with the user's chance. In no function shall the author/distributor (IBM World wide web Security Systems X-Force) be held liable for almost any damages whatsoever arising out of or in connection together with the use or distribute of this data.
For corrections or additions make sure you e mail xforce@iss.net
Return on the principal page