HP-UX Vue three.0 permits neighborhood consumer to get root privileges hp-vue (2284) Higher Chance ,
Office 2007 Ultimate
Description:
A vulnerability in Vue in HP-UX methods could enable a regional attacker to gain superuser privileges.
Consequences:
Gain Privileges
Remedy:
This concern was resolved by two sets of patches from two different Hewlett-Packard Protection Bulletins:
HPSBUX9404-008: Utilize patch PHSS_4055 for HP9000 Series 300/400 or patch PHSS_4038 for HP9000 Sequence 700/800. See References. HPSBUX9504-027. Utilize patch PHSS_4055 for HP9000 Series 300/400 or patch PHSS_4066 for HP9000 Sequence 700/800. See References.
References:
CIAC Information Bulletin E-23b: Vulnerability in HP-UX techniques with HP Vue 3.0. Hewlett-Packard Firm Protection Bulletin HPSBUX9404-008: Safety Vulnerability in Vue three.0. Hewlett-Packard Organization Protection Bulletin HPSBUX9504-027: Protection Vulnerability in HP VUE3.0. (From SecurityFocus archive.) CVE-1999-1134: Vulnerability in Vue 3.0 in HP 9.x permits regional customers to achieve root privileges, as fixed by PHSS_4038, PHSS_4055,
Office Standard 2007 Key, and PHSS_4066. CVE-1999-1135: Vulnerability in VUE 3.0 in HP 9.x makes it possible for neighborhood customers to gain root privileges, as fixed by PHSS_4994 and PHSS_5438.
Platforms Affected:
HP HP-UX nine.00 HP HP-UX nine.01 HP HP-UX nine.03 HP HP-UX 9.04 HP HP-UX nine.05 HP HP-UX 9.06 HP HP-UX nine.07 HP HP-UX nine.08 HP HP-UX 9.09 HP HP-UX 9.10
Reported:
Apr 20,
Windows 7 Home Premium Product Key, 1994
The info inside of this database might modify devoid of notice. Utilization of this data constitutes acceptance for use in an AS IS issue. There aren't any warranties,
Office 2010 Professional Key, implied or otherwise,
Windows 7 Activation Key, with regard to this info or its use. Any utilization of this info is with the user's chance. In no function shall the author/distributor (IBM Internet Safety Systems X-Force) be held liable for almost any damages whatsoever arising out of or in connection using the use or spread of this details.
For corrections or additions please e mail xforce@iss.net
Return towards the major page