HP-UX Vue 3.0 makes it possible for regional user to get root privileges hp-vue (2284) Large Danger
Description:
A vulnerability in Vue in HP-UX programs could let a local attacker to realize superuser privileges.
Consequences:
Gain Privileges
Remedy:
This issue was resolved by two sets of patches from two diverse Hewlett-Packard Security Bulletins:
HPSBUX9404-008: Utilize patch PHSS_4055 for HP9000 Series 300/400 or patch PHSS_4038 for HP9000 Sequence 700/800. See References. HPSBUX9504-027. Use patch PHSS_4055 for HP9000 Series 300/400 or patch PHSS_4066 for HP9000 Sequence 700/800. See References.
References:
CIAC Details Bulletin E-23b: Vulnerability in HP-UX methods with HP Vue 3.0. Hewlett-Packard Firm Safety Bulletin HPSBUX9404-008: Protection Vulnerability in Vue three.0. Hewlett-Packard Firm Protection Bulletin HPSBUX9504-027: Protection Vulnerability in HP VUE3.0. (From SecurityFocus archive.) CVE-1999-1134: Vulnerability in Vue three.0 in HP nine.x permits local end users to realize root privileges, as fixed by PHSS_4038,
Office 2007 Key, PHSS_4055,
Office 2007 Activation Key, and PHSS_4066. CVE-1999-1135: Vulnerability in VUE three.0 in HP 9.x makes it possible for neighborhood users to realize root privileges,
Office Enterprise 2007 Key, as fixed by PHSS_4994 and PHSS_5438.
Platforms Affected:
HP HP-UX nine.00 HP HP-UX nine.01 HP HP-UX nine.03 HP HP-UX nine.04 HP HP-UX 9.05 HP HP-UX 9.06 HP HP-UX 9.07 HP HP-UX 9.08 HP HP-UX nine.09 HP HP-UX nine.10
Reported:
Apr 20,
Windows 7 X86, 1994
The info within this database might modify without discover. Utilization of this information constitutes acceptance for use in an AS IS situation. There are no warranties,
Microsoft Office Home And Student 2010, implied or in any other case, regarding this data or its use. Any utilization of this details is at the user's danger. In no event shall the author/distributor (IBM World wide web Security Systems X-Force) be held liable for just about any damages whatsoever arising from or in connection with all the use or distribute of this details.
For corrections or additions please email xforce@iss.net
Return on the main page