CERTA-2000-AVI-073

Vulnerability from certfr_avis - Published: - Updated:

Deux vulnérabilités découvertes dans le script Auto_parms permettent à un utilisateur local d'usurper les privilèges root lors du démarrage de la machine.

Description

Le script Auto_parms permet de gérer la configuration DHCP (Dynamic Host Configuration Protocol). Ce script est appelé à chaque démarrage de la machine. Les vulnérabilités découvertes permettent à un utilisateur mal intentionné d'usurper les privilèges de ROOT lors du lancement de ce script.

Un programme permettant de réaliser d'exploiter cette vulnérabilité est largement répandu sur internet.

Solution

Correctifs suivant les versions d'HP-UX :

| | | |:------------|:-----------| | Version | correctif | | HP-UX 11.00 | PHCO_21993 | | HP-UX 11.04 | PHCO_22186 | | HP-UX 10.20 | PHCO_21992 | | HP-UX 10.24 | PHCO_22185 | | HP-UX 10.26 | PHCO_22591 | | HP-UX 10.10 | PHCO_21991 | | HP-UX 10.16 | PHCO_22634 | | HP-UX 10.01 | PHCO_21990 |

Correctif disponible sur le site :

http://europe-support.external.hp.com

HP9000 séries 700/800 sous HP-UX 10.xx et 11.xx

Impacted products
Vendor Product Description
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eHP9000 s\u00e9ries 700/800 sous HP-UX 10.xx et 11.xx\u003c/P\u003e",
  "content": "## Description\n\nLe script Auto_parms permet de g\u00e9rer la configuration DHCP (Dynamic Host\nConfiguration Protocol). Ce script est appel\u00e9 \u00e0 chaque d\u00e9marrage de la\nmachine. Les vuln\u00e9rabilit\u00e9s d\u00e9couvertes permettent \u00e0 un utilisateur mal\nintentionn\u00e9 d\u0027usurper les privil\u00e8ges de ROOT lors du lancement de ce\nscript.  \n  \n\nUn programme permettant de r\u00e9aliser d\u0027exploiter cette vuln\u00e9rabilit\u00e9 est\nlargement r\u00e9pandu sur internet.\n\n## Solution\n\nCorrectifs suivant les versions d\u0027HP-UX :\n\n  \n\n\u003cdiv markdown=\"1\" align=\"center\"\u003e\n\n|             |            |\n|:------------|:-----------|\n| Version     | correctif  |\n| HP-UX 11.00 | PHCO_21993 |\n| HP-UX 11.04 | PHCO_22186 |\n| HP-UX 10.20 | PHCO_21992 |\n| HP-UX 10.24 | PHCO_22185 |\n| HP-UX 10.26 | PHCO_22591 |\n| HP-UX 10.10 | PHCO_21991 |\n| HP-UX 10.16 | PHCO_22634 |\n| HP-UX 10.01 | PHCO_21990 |\n\n\u003c/div\u003e\n\n  \n\nCorrectif disponible sur le site :\n\n    http://europe-support.external.hp.com\n",
  "cves": [],
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP",
      "url": "http://itrc.hp.com"
    }
  ],
  "reference": "CERTA-2000-AVI-073",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2000-11-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Risque important car l\u0027exploitation de la vuln\u00e9rabilit\u00e9 est facilement accessible"
    },
    {
      "description": "Acc\u00e8s en local aux privil\u00e8ges administrateur"
    }
  ],
  "summary": "Deux vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans le script Auto_parms permettent \u00e0\nun utilisateur local d\u0027usurper les privil\u00e8ges root lors du d\u00e9marrage de\nla machine.\n",
  "title": "Vuln\u00e9rabilit\u00e9 sous HP-UX du script auto_parms",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Hewlett Packard",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…