Multiple buffer overflows in HP Tru64 UNIX 5.x allow local users to execute arbitrary code via (1) a long -contextDir argument to dtaction, (2) a long -p argument to dtprintinfo, (3) a long -customization argument to dxterm, or (4) a long DISPLAY environment variable to dtterm.
References
Link | Resource |
---|---|
http://www.securityfocus.com/archive/1/290115 | Vendor Advisory |
http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dxterm.txt | Exploit |
http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtterm.txt | Exploit |
http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtprintinfo.txt | Exploit |
http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_dtaction.txt | Exploit |
http://www.kb.cert.org/vuls/id/836275 | US Government Resource |
http://www.kb.cert.org/vuls/id/600699 | US Government Resource |
http://www.kb.cert.org/vuls/id/931579 | US Government Resource |
http://www.kb.cert.org/vuls/id/202939 | US Government Resource |
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html |
Configurations
Information
Published : 2002-12-30 21:00
Updated : 2011-03-07 18:10
NVD link : CVE-2002-1617
Mitre link : CVE-2002-1617
JSON object : View
CWE
Products Affected
hp
- tru64