CVE-2002-1616

Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt Exploit
http://www.kb.cert.org/vuls/id/137555 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/177067 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/193347 Patch US Government Resource
http://www.kb.cert.org/vuls/id/671627 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/864083 US Government Resource
http://www.securityfocus.com/archive/1/290115 Vendor Advisory
http://www.securityfocus.com/bid/5379 Vendor Advisory
http://www.securityfocus.com/bid/5380 Patch
http://www.securityfocus.com/bid/5381 Patch
http://www.securityfocus.com/bid/5382 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/10614
https://exchange.xforce.ibmcloud.com/vulnerabilities/11620
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt Exploit
http://www.kb.cert.org/vuls/id/137555 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/177067 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/193347 Patch US Government Resource
http://www.kb.cert.org/vuls/id/671627 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/864083 US Government Resource
http://www.securityfocus.com/archive/1/290115 Vendor Advisory
http://www.securityfocus.com/bid/5379 Vendor Advisory
http://www.securityfocus.com/bid/5380 Patch
http://www.securityfocus.com/bid/5381 Patch
http://www.securityfocus.com/bid/5382 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/10614
https://exchange.xforce.ibmcloud.com/vulnerabilities/11620
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:hp:tru64:4.0f:*:*:*:*:*:*:*
cpe:2.3:o:hp:tru64:4.0g:*:*:*:*:*:*:*
cpe:2.3:o:hp:tru64:5.0a:*:*:*:*:*:*:*
cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*
cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*

History

20 Nov 2024, 23:41

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html - () http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html -
References () http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html - () http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html -
References () http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt - Exploit () http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt - Exploit
References () http://www.kb.cert.org/vuls/id/137555 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/137555 - Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/177067 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/177067 - Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/193347 - Patch, US Government Resource () http://www.kb.cert.org/vuls/id/193347 - Patch, US Government Resource
References () http://www.kb.cert.org/vuls/id/671627 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/671627 - Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/864083 - US Government Resource () http://www.kb.cert.org/vuls/id/864083 - US Government Resource
References () http://www.securityfocus.com/archive/1/290115 - Vendor Advisory () http://www.securityfocus.com/archive/1/290115 - Vendor Advisory
References () http://www.securityfocus.com/bid/5379 - Vendor Advisory () http://www.securityfocus.com/bid/5379 - Vendor Advisory
References () http://www.securityfocus.com/bid/5380 - Patch () http://www.securityfocus.com/bid/5380 - Patch
References () http://www.securityfocus.com/bid/5381 - Patch () http://www.securityfocus.com/bid/5381 - Patch
References () http://www.securityfocus.com/bid/5382 - Patch () http://www.securityfocus.com/bid/5382 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/10614 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/10614 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/11620 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/11620 -

Information

Published : 2002-08-01 04:00

Updated : 2024-11-20 23:41


NVD link : CVE-2002-1616

Mitre link : CVE-2002-1616

CVE.ORG link : CVE-2002-1616


JSON object : View

Products Affected

hp

  • tru64