CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:S/C:P/I:P/A:P
AI Score
Confidence
High
EPSS
Percentile
0.4%
Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew.
Vendor | Product | Version | CPE |
---|---|---|---|
symantec_veritas | cluster_server | 2.2 | cpe:2.3:a:symantec_veritas:cluster_server:2.2:*:*:*:*:*:*:* |
symantec_veritas | cluster_server | 2.2_linux | cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux:*:*:*:*:*:*:* |
symantec_veritas | cluster_server | 2.2_linux_mp1p1 | cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux_mp1p1:*:*:*:*:*:*:* |
symantec_veritas | cluster_server | 2.2_mp1 | cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp1:*:*:*:*:*:*:* |
symantec_veritas | cluster_server | 2.2_mp2 | cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp2:*:*:*:*:*:*:* |
symantec_veritas | cluster_server | 3.5 | cpe:2.3:a:symantec_veritas:cluster_server:3.5:*:*:*:*:*:*:* |
symantec_veritas | cluster_server | 3.5_aix | cpe:2.3:a:symantec_veritas:cluster_server:3.5_aix:*:*:*:*:*:*:* |
symantec_veritas | cluster_server | 3.5_hp-ux | cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux:*:*:*:*:*:*:* |
symantec_veritas | cluster_server | 3.5_hp-ux_update_1 | cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_1:*:*:*:*:*:*:* |
symantec_veritas | cluster_server | 3.5_hp-ux_update_2 | cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_2:*:*:*:*:*:*:* |
marc.info/?l=bugtraq&m=113199516516880&w=2
osvdb.org/20673
secunia.com/advisories/17502
securityreason.com/securityalert/174
securityresponse.symantec.com/avcenter/security/Content/2005.11.08a.html
securitytracker.com/id?1015169
www.securityfocus.com/bid/15349
www.vupen.com/english/advisories/2005/2350
exchange.xforce.ibmcloud.com/vulnerabilities/22986