HP-UX Vue 3.0 permits neighborhood consumer to obtain root privileges hp-vue (2284) Large Risk
Description:
A vulnerability in Vue in HP-UX techniques could let a neighborhood attacker to gain superuser privileges.
Consequences:
Gain Privileges
Remedy:
This problem was resolved by two sets of patches from two different Hewlett-Packard Safety Bulletins:
HPSBUX9404-008: Utilize patch PHSS_4055 for HP9000 Sequence 300/400 or patch PHSS_4038 for HP9000 Sequence 700/800. See References. HPSBUX9504-027. Apply patch PHSS_4055 for HP9000 Series 300/400 or patch PHSS_4066 for HP9000 Sequence 700/800. See References.
References:
CIAC Details Bulletin E-23b: Vulnerability in HP-UX programs with HP Vue 3.0. Hewlett-Packard Organization Protection Bulletin HPSBUX9404-008: Protection Vulnerability in Vue 3.0. Hewlett-Packard Firm Safety Bulletin HPSBUX9504-027: Security Vulnerability in HP VUE3.0. (From SecurityFocus archive.) CVE-1999-1134: Vulnerability in Vue three.0 in HP 9.x permits local end users to gain root privileges,
Office Professional Plus 2010 Sale, as fixed by PHSS_4038,
Office 2010 Standard Product Key,
Genuine Windows 7 Home Premium jhgjhg, PHSS_4055,
Windows 7 Home Basic Key, and PHSS_4066. CVE-1999-1135: Vulnerability in VUE three.0 in HP nine.x allows local consumers to gain root privileges,
Microsoft Office Professional, as fixed by PHSS_4994 and PHSS_5438.
Platforms Impacted:
HP HP-UX 9.00 HP HP-UX nine.01 HP HP-UX nine.03 HP HP-UX nine.04 HP HP-UX 9.05 HP HP-UX 9.06 HP HP-UX nine.07 HP HP-UX nine.08 HP HP-UX 9.09 HP HP-UX nine.10
Reported:
Apr 20, 1994
The information inside of this database may alter with out discover. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or otherwise,
Office 2007 Standard Key, regarding this information or its use. Any use of this details is on the user's threat. In no celebration shall the author/distributor (IBM Internet Protection Systems X-Force) be held liable for just about any damages whatsoever arising out of or in connection together with the use or spread of this data.
For corrections or additions make sure you email xforce@iss.net
Return towards the principal page