CERTA-2005-AVI-112
Vulnerability from certfr_avis - Published: 2005-03-14 - Updated: 2005-03-14None
Description
Selon HP, un utilisateur local mal intentionné peut par le biais de l'interface de communication inter-processus basé sur les files de messages, réaliser un déni de service sur le système vulnérable.
Solution
Pour l'obtention des correctifs consulter le bulletin de sécurité de l'éditeur (cf. section Documentation).
HP Tru64 UNIX versions V4.0F, V4.0G, V5.1A, V5.1B-1, V5.1B-2.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eHP Tru64 UNIX versions V4.0F, V4.0G, V5.1A, V5.1B-1, V5.1B-2.\u003c/p\u003e",
"content": "## Description\n\nSelon HP, un utilisateur local mal intentionn\u00e9 peut par le biais de\nl\u0027interface de communication inter-processus bas\u00e9 sur les files de\nmessages, r\u00e9aliser un d\u00e9ni de service sur le syst\u00e8me vuln\u00e9rable.\n\n## Solution\n\nPour l\u0027obtention des correctifs consulter le bulletin de s\u00e9curit\u00e9 de\nl\u0027\u00e9diteur (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2005-03-14T00:00:00",
"last_revision_date": "2005-03-14T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 HPSBTU01109 de Hewlett-Packard \"HP Tru64 UNIX message queue, local denial of service (DOS)\" du 08 mars 2005 :",
"url": "http://itrc.hp.com"
}
],
"reference": "CERTA-2005-AVI-112",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": null,
"title": "D\u00e9ni de service sous HP Tru64 Unix",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HPSBTU01109 de HP",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…