You are here: hacking technology > System crack > Content
Hot Articles
Recommend Articles
New Articles
HP TCP/IP Services for consideration OpenVMS Finger client format string loopholes
  Add date: 03/04/2011   Publishing date: 03/04/2011   Hits: 64

Influence version:

HP TCP/IP Services for OpenVMS 5.3 seas

HP TCP/IP Services for consideration OpenVMS 5.6

HP TCP/IP Services for consideration OpenVMS 5.5

HP TCP/IP Services for consideration OpenVMS 5.4 vulnerability describes:

BUGTRAQ ID: 30948

CNCAN ID: CNCAN - 2008090303

 

HP OpenVMS is a section HP a AlphaServer server use or operating system.

HP OpenVMS finger client exist format string problem, remote attacker can use holes on application permissions performs arbitrary instructions.

HP OpenVMS finger client incorrect filtering input, construct special format string as parameters data, can lead to memory, cause denial-of-service attack damage or arbitrary code execution attack. < * reference

Loophole providers

Claes Nyberg Christer Oberg, James, Tusini

* >

SEBUG safe proposal:

No current offer solutions: http://h71000.www7.hp.com/doc/tcpip56.html

/ / sebug.net


Prev:From Solaris NFS pages four kernel module local denial-of-service loopholes Next:HP - UX 'FTPD' unknown remote privilege promotion loopholes

Comment:

Category: Home > System crack