Buffer overflow in dtmail on HP Tru64 UNIX 4.0F through 5.1B and HP-UX B.11.00 through B.11.23 allows local users to execute arbitrary code via a long -a (aka attachment) argument.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5175 | vdb entry signature |
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00793091 | vendor advisory |
http://securitytracker.com/id?1017083 | vdb entry |
http://www.securityfocus.com/bid/20580 | vdb entry |
http://www.netragard.com/pdfs/research/HP-TRU64-DTMAIL-20060810.txt | vendor advisory |
http://securitytracker.com/id?1017098 | vdb entry patch |
http://securitytracker.com/id?1017099 | vdb entry patch |
http://secunia.com/advisories/22528 | third party advisory |
http://www.vupen.com/english/advisories/2006/4140 | vdb entry |
http://secunia.com/advisories/22451 | third party advisory |
http://www.vupen.com/english/advisories/2006/4139 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29644 | vdb entry |
http://www.securityfocus.com/archive/1/449321/100/0/threaded | vendor advisory |