CERTA-2010-AVI-413
Vulnerability from certfr_avis - Published: 2010-09-01 - Updated: 2010-09-01
Une vulnérabilité dans HP-UX exécutant Software Distributor (SD-UX) a été corrigée. Elle permet une élévation de privilèges locale et un contournement de la politque de sécurité.
Description
Une vulnérabilité a été identifiée dans les systèmes HP-UX qui exécutent le logiciel Software Distributor (SD-UX). Elle permet à une personne malintentionnée d'élever localement ses privilèges et de contourner la politique de sécurité du système.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "HP-UX B.11.31.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP-UX B.11.23 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "HP-UX B.11.11 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 identifi\u00e9e dans les syst\u00e8mes HP-UX qui ex\u00e9cutent\nle logiciel Software Distributor (SD-UX). Elle permet \u00e0 une personne\nmalintentionn\u00e9e d\u0027\u00e9lever localement ses privil\u00e8ges et de contourner la\npolitique de s\u00e9curit\u00e9 du syst\u00e8me.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-2712",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2712"
}
],
"initial_release_date": "2010-09-01T00:00:00",
"last_revision_date": "2010-09-01T00:00:00",
"links": [],
"reference": "CERTA-2010-AVI-413",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-09-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans HP-UX ex\u00e9cutant Software Distributor (SD-UX) a\n\u00e9t\u00e9 corrig\u00e9e. Elle permet une \u00e9l\u00e9vation de privil\u00e8ges locale et un\ncontournement de la politque de s\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans HP-UX Software Distributor",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP-UX c02285980 du 25 ao\u00fbt 2010",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02285980"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…