HP-UX Vue 3.0 permits local user to get root privileges hp-vue (2284) Large Danger ,
Buy Office 2010
Description:
A vulnerability in Vue in HP-UX techniques could permit a neighborhood attacker to gain superuser privileges.
Consequences:
Gain Privileges
Remedy:
This concern was resolved by two sets of patches from two distinct Hewlett-Packard Safety Bulletins:
HPSBUX9404-008: Apply patch PHSS_4055 for HP9000 Series 300/400 or patch PHSS_4038 for HP9000 Sequence 700/800. See References. HPSBUX9504-027. Utilize patch PHSS_4055 for HP9000 Series 300/400 or patch PHSS_4066 for HP9000 Series 700/800. See References.
References:
CIAC Info Bulletin E-23b: Vulnerability in HP-UX methods with HP Vue 3.0. Hewlett-Packard Company Protection Bulletin HPSBUX9404-008: Protection Vulnerability in Vue three.0. Hewlett-Packard Company Safety Bulletin HPSBUX9504-027: Safety Vulnerability in HP VUE3.0. (From SecurityFocus archive.) CVE-1999-1134: Vulnerability in Vue 3.0 in HP nine.x makes it possible for regional end users to realize root privileges,
Office Enterprise 2007 Key, as fixed by PHSS_4038, PHSS_4055, and PHSS_4066. CVE-1999-1135: Vulnerability in VUE three.0 in HP 9.x permits regional consumers to achieve root privileges,
Microsoft Office Professional 2010, as fixed by PHSS_4994 and PHSS_5438.
Platforms Impacted:
HP HP-UX 9.00 HP HP-UX nine.01 HP HP-UX nine.03 HP HP-UX 9.04 HP HP-UX nine.05 HP HP-UX nine.06 HP HP-UX 9.07 HP HP-UX 9.08 HP HP-UX 9.09 HP HP-UX 9.ten
Reported:
Apr 20,
Windows 7 Ultimate Key, 1994
The information within this database might change without having observe. Use of this info constitutes acceptance for use in an AS IS problem. There aren't any warranties,
Windows 7 Enterprise Product Key, implied or otherwise, regarding this information or its use. Any use of this data is with the user's risk. In no celebration shall the author/distributor (IBM Web Security Systems X-Force) be held liable for any damages whatsoever arising from or in connection together with the use or distribute of this data.
For corrections or additions please e-mail xforce@iss.net
Return to the major page