HP-UX Vue three.0 enables regional user to obtain root privileges hp-vue (2284) High Risk
Description:
A vulnerability in Vue in HP-UX systems could allow a regional attacker to achieve superuser privileges.
Consequences:
Gain Privileges
Remedy:
This situation was resolved by two sets of patches from two different Hewlett-Packard Protection Bulletins:
HPSBUX9404-008: Apply patch PHSS_4055 for HP9000 Sequence 300/400 or patch PHSS_4038 for HP9000 Sequence 700/800. See References. HPSBUX9504-027. Apply patch PHSS_4055 for HP9000 Series 300/400 or patch PHSS_4066 for HP9000 Sequence 700/800. See References.
References:
CIAC Information Bulletin E-23b: Vulnerability in HP-UX techniques with HP Vue 3.0. Hewlett-Packard Company Security Bulletin HPSBUX9404-008: Security Vulnerability in Vue 3.0. Hewlett-Packard Organization Protection Bulletin HPSBUX9504-027: Safety Vulnerability in HP VUE3.0. (From SecurityFocus archive.) CVE-1999-1134: Vulnerability in Vue 3.0 in HP 9.x permits regional customers to achieve root privileges, as fixed by PHSS_4038,
Office 2007 Professional Plus, PHSS_4055,
Office 2010 Serial, and PHSS_4066. CVE-1999-1135: Vulnerability in VUE three.0 in HP nine.x allows neighborhood consumers to gain root privileges, as fixed by PHSS_4994 and PHSS_5438.
Platforms Impacted:
HP HP-UX 9.00 HP HP-UX nine.01 HP HP-UX nine.03 HP HP-UX nine.04 HP HP-UX 9.05 HP HP-UX nine.06 HP HP-UX nine.07 HP HP-UX 9.08 HP HP-UX nine.09 HP HP-UX nine.ten
Reported:
Apr twenty,
Windows 7 Ultimate Key, 1994
The data inside this database may possibly modify devoid of recognize. Use of this details constitutes acceptance for use in an AS IS situation. There aren't any warranties,
Microsoft Windows 7, implied or or else,
Office 2010 Serial Generator, with regard to this details or its use. Any use of this data is in the user's danger. In no celebration shall the author/distributor (IBM Internet Protection Methods X-Force) be held liable for almost any damages whatsoever arising from or in connection together with the use or spread of this information.
For corrections or additions please e-mail xforce@iss.net
Return towards the major page