CERTA-2004-AVI-412

Vulnerability from certfr_avis - Published: 2004-12-22 - Updated: 2005-01-03

None

Description

Une vulnérabilité présente dans le service de transfert de fichier FTP sous HP-UX permet à un utilisateur mal intentionné d'exécuter du code arbitraire à distance avec les droits du service FTP lorsque celui-ci a été démarré avec l'option -v (debug) à partir du service inetd.

Solution

Appliquer les correctifs fournis par l'éditeur suivant la version impactée.

HP-UX version 11.11i.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eHP-UX version 11.11i.\u003c/P\u003e",
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 pr\u00e9sente dans le service de transfert de fichier FTP\nsous HP-UX permet \u00e0 un utilisateur mal intentionn\u00e9 d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance avec les droits du service FTP lorsque celui-ci a\n\u00e9t\u00e9 d\u00e9marr\u00e9 avec l\u0027option -v (debug) \u00e0 partir du service `inetd`.\n\n## Solution\n\nAppliquer les correctifs fournis par l\u0027\u00e9diteur suivant la version\nimpact\u00e9e.\n",
  "cves": [],
  "initial_release_date": "2004-12-22T00:00:00",
  "last_revision_date": "2005-01-03T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP HPSBUX0107-162 \"ftp and ftpd remote    unauthorized access\" du 22 d\u00e9cembre 2004 :",
      "url": "http://www5.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0107-162"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 iDefense \"Hewlett Packard HP-UX ftpd    Remote Buffer overflow vulnerability\" du 21 d\u00e9cembre 2004 :",
      "url": "http://www.idefense.com/application/poi/display?id=175\u0026type=vulnerabilities"
    }
  ],
  "reference": "CERTA-2004-AVI-412",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-12-22T00:00:00.000000"
    },
    {
      "description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 de HP.",
      "revision_date": "2005-01-03T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "\u00c9levation de privil\u00e8ges"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 dans le service FTP sous HP-UX",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 iDefense du 21 d\u00e9cembre 2004",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…