Lucene search

K
certCERTVU:229867
HistoryMar 21, 2003 - 12:00 a.m.

HP Tru64 UNIX "su" command vulnerable to buffer overflow

2003-03-2100:00:00
www.kb.cert.org
16

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

10.3%

Overview

The Hewlett Packard Tru64 “su” command contains a locally exploitable buffer overflow. An exploit for this vulnerability is known to exist and may be circulating.

Description

The Hewlett Packard Tru64 operating system contains a command, known as “su,” that allows users to assume the privileges of another user. This program is vulnerable to a buffer overflow.


Impact

This vulnerability can be exploited by local non-root users on a machine to cause a denial-of-service condition, or assume the privileges of the root user.


Solution

Hewlett Packard has issued a patch that corrects this vulnerability. More information can be found here.


Vendor Information

229867

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Hewlett-Packard Company __ Affected

Updated: August 12, 2002

Status

Affected

Vendor Statement

See <http://ftp.support.compaq.com/patches/public/Readmes/unix/t64v51b19-c0136900-14951-es-20020730.README&gt;.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23229867 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This document was written by Ian A Finlay.

Other Information

CVE IDs: CVE-2002-0816
Severity Metric: 18.75 Date Public:

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

10.3%

Related for VU:229867