HP-UX Vue 3.0 enables nearby consumer to get root privileges hp-vue (2284) Substantial Risk
Description:
A vulnerability in Vue in HP-UX techniques could enable a nearby attacker to realize superuser privileges.
Consequences:
Gain Privileges
Remedy:
This situation was resolved by two sets of patches from two distinct Hewlett-Packard Safety Bulletins:
HPSBUX9404-008: Utilize patch PHSS_4055 for HP9000 Sequence 300/400 or patch PHSS_4038 for HP9000 Series 700/800. See References. HPSBUX9504-027. Apply patch PHSS_4055 for HP9000 Series 300/400 or patch PHSS_4066 for HP9000 Sequence 700/800. See References.
References:
CIAC Details Bulletin E-23b: Vulnerability in HP-UX techniques with HP Vue 3.0. Hewlett-Packard Company Safety Bulletin HPSBUX9404-008: Safety Vulnerability in Vue three.0. Hewlett-Packard Business Security Bulletin HPSBUX9504-027: Security Vulnerability in HP VUE3.0. (From SecurityFocus archive.) CVE-1999-1134: Vulnerability in Vue 3.0 in HP 9.x makes it possible for local end users to achieve root privileges, as fixed by PHSS_4038,
Microsoft Office 2007, PHSS_4055,
Cheap Windows 7 Enterprise, and PHSS_4066. CVE-1999-1135: Vulnerability in VUE three.0 in HP nine.x enables regional end users to achieve root privileges,
Windows 7 Enterprise Product Key, as fixed by PHSS_4994 and PHSS_5438.
Platforms Impacted:
HP HP-UX nine.00 HP HP-UX nine.01 HP HP-UX 9.03 HP HP-UX nine.04 HP HP-UX nine.05 HP HP-UX 9.06 HP HP-UX 9.07 HP HP-UX 9.08 HP HP-UX nine.09 HP HP-UX nine.ten
Reported:
Apr 20, 1994
The data inside this database might adjust devoid of recognize. Use of this data constitutes acceptance for use in an AS IS problem. There aren't any warranties,
Microsoft Office Standard, implied or or else,
Microsoft Office Professional Plus 2010 Key, regarding this info or its use. Any use of this data is on the user's threat. In no occasion shall the author/distributor (IBM Net Security Systems X-Force) be held liable for any damages whatsoever arising from or in connection with all the use or distribute of this details.
For corrections or additions please email xforce@iss.net
Return towards the main page