HP-UX Vue three.0 makes it possible for regional person to obtain root privileges hp-vue (2284) High Chance
Description:
A vulnerability in Vue in HP-UX methods could allow a regional attacker to realize superuser privileges.
Consequences:
Gain Privileges
Remedy:
This situation was resolved by two sets of patches from two diverse Hewlett-Packard Safety Bulletins:
HPSBUX9404-008: Apply patch PHSS_4055 for HP9000 Sequence 300/400 or patch PHSS_4038 for HP9000 Sequence 700/800. See References. HPSBUX9504-027. Apply patch PHSS_4055 for HP9000 Sequence 300/400 or patch PHSS_4066 for HP9000 Series 700/800. See References.
References:
CIAC Info Bulletin E-23b: Vulnerability in HP-UX systems with HP Vue three.0. Hewlett-Packard Business Safety Bulletin HPSBUX9404-008: Security Vulnerability in Vue three.0. Hewlett-Packard Business Safety Bulletin HPSBUX9504-027: Protection Vulnerability in HP VUE3.0. (From SecurityFocus archive.) CVE-1999-1134: Vulnerability in Vue 3.0 in HP nine.x permits nearby customers to achieve root privileges,
Office Pro Plus 2010 Key, as fixed by PHSS_4038,
Office Professional Plus 2007, PHSS_4055, and PHSS_4066. CVE-1999-1135: Vulnerability in VUE 3.0 in HP nine.x permits neighborhood end users to realize root privileges,
Office Pro Plus 2007, as fixed by PHSS_4994 and PHSS_5438.
Platforms Affected:
HP HP-UX nine.00 HP HP-UX nine.01 HP HP-UX nine.03 HP HP-UX nine.04 HP HP-UX nine.05 HP HP-UX nine.06 HP HP-UX nine.07 HP HP-UX 9.08 HP HP-UX 9.09 HP HP-UX 9.10
Reported:
Apr twenty, 1994
The data inside of this database may well change devoid of discover. Use of this information constitutes acceptance for use in an AS IS issue. There are no warranties,
Windows 7 Discount, implied or or else,
Office 2010 Professional Plus Key, with regard to this details or its use. Any use of this data is on the user's chance. In no celebration shall the author/distributor (IBM Internet Security Programs X-Force) be held liable for almost any damages whatsoever arising from or in connection together with the use or spread of this data.
For corrections or additions please email xforce@iss.net
Return on the principal page