HP-UX Vue 3.0 makes it possible for regional person to obtain root privileges hp-vue (2284) Large Risk ,
Office 2007 Product Key
Description:
A vulnerability in Vue in HP-UX programs could let a neighborhood attacker to achieve superuser privileges.
Consequences:
Gain Privileges
Remedy:
This problem was resolved by two sets of patches from two various Hewlett-Packard Safety Bulletins:
HPSBUX9404-008: Utilize patch PHSS_4055 for HP9000 Series 300/400 or patch PHSS_4038 for HP9000 Sequence 700/800. See References. HPSBUX9504-027. Apply patch PHSS_4055 for HP9000 Sequence 300/400 or patch PHSS_4066 for HP9000 Sequence 700/800. See References.
References:
CIAC Information Bulletin E-23b: Vulnerability in HP-UX methods with HP Vue 3.0. Hewlett-Packard Business Protection Bulletin HPSBUX9404-008: Safety Vulnerability in Vue 3.0. Hewlett-Packard Company Safety Bulletin HPSBUX9504-027: Safety Vulnerability in HP VUE3.0. (From SecurityFocus archive.) CVE-1999-1134: Vulnerability in Vue three.0 in HP 9.x allows neighborhood customers to achieve root privileges,
Office 2007 Professional, as fixed by PHSS_4038, PHSS_4055, and PHSS_4066. CVE-1999-1135: Vulnerability in VUE 3.0 in HP 9.x allows local consumers to achieve root privileges,
Windows 7 Professional, as fixed by PHSS_4994 and PHSS_5438.
Platforms Impacted:
HP HP-UX nine.00 HP HP-UX nine.01 HP HP-UX 9.03 HP HP-UX nine.04 HP HP-UX 9.05 HP HP-UX nine.06 HP HP-UX 9.07 HP HP-UX nine.08 HP HP-UX nine.09 HP HP-UX nine.10
Reported:
Apr 20,
Office Professional 2007, 1994
The info within this database may possibly modify without having notice. Utilization of this info constitutes acceptance for use in an AS IS issue. There aren't any warranties, implied or otherwise,
Microsoft Office 2007 Professional, with regard to this information or its use. Any use of this info is in the user's threat. In no celebration shall the author/distributor (IBM World wide web Safety Systems X-Force) be held liable for almost any damages whatsoever arising out of or in connection with all the use or distribute of this information.
For corrections or additions make sure you electronic mail xforce@iss.net
Return towards the main page