HP-UX Vue three.0 enables neighborhood consumer to get root privileges hp-vue (2284) High Danger ,
Office 2010 Professional
Description:
A vulnerability in Vue in HP-UX methods could enable a local attacker to realize superuser privileges.
Consequences:
Gain Privileges
Remedy:
This concern was resolved by two sets of patches from two different Hewlett-Packard Safety Bulletins:
HPSBUX9404-008: Utilize patch PHSS_4055 for HP9000 Series 300/400 or patch PHSS_4038 for HP9000 Series 700/800. See References. HPSBUX9504-027. Utilize patch PHSS_4055 for HP9000 Sequence 300/400 or patch PHSS_4066 for HP9000 Series 700/800. See References.
References:
CIAC Information Bulletin E-23b: Vulnerability in HP-UX programs with HP Vue three.0. Hewlett-Packard Firm Protection Bulletin HPSBUX9404-008: Protection Vulnerability in Vue 3.0. Hewlett-Packard Firm Security Bulletin HPSBUX9504-027: Protection Vulnerability in HP VUE3.0. (From SecurityFocus archive.) CVE-1999-1134: Vulnerability in Vue 3.0 in HP nine.x permits regional end users to realize root privileges,
Windows 7 Serial, as fixed by PHSS_4038,
Windows 7 64 Bit, PHSS_4055,
Microsoft Office 2010 Professional Plus, and PHSS_4066. CVE-1999-1135: Vulnerability in VUE 3.0 in HP 9.x allows neighborhood customers to gain root privileges, as fixed by PHSS_4994 and PHSS_5438.
Platforms Impacted:
HP HP-UX nine.00 HP HP-UX 9.01 HP HP-UX nine.03 HP HP-UX nine.04 HP HP-UX 9.05 HP HP-UX nine.06 HP HP-UX nine.07 HP HP-UX nine.08 HP HP-UX 9.09 HP HP-UX nine.10
Reported:
Apr 20, 1994
The info in this database might change without notice. Utilization of this details constitutes acceptance for use in an AS IS issue. There aren't any warranties, implied or or else,
Windows 7 Activation, with regard to this details or its use. Any use of this information is at the user's danger. In no celebration shall the author/distributor (IBM Internet Safety Programs X-Force) be held liable for any damages whatsoever arising from or in connection with all the use or spread of this information.
For corrections or additions please e-mail xforce@iss.net
Return for the primary page