{"vuid":"VU#193347","idnumber":"193347","name":"HP Tru64 UNIX contains buffer overflow in libc libraries (SSRT2257)","keywords":["Compaq","Tru64","non-executeable stack","buffer overflow","SIA libraries"],"overview":"The HP Tru64 Unix operating system contains multiple buffer overflow vulnerabilities.","clean_desc":"A vulnerability exists in the way in which the libc libraries handle environment variables in the  HP Tru64 UNIX operating system. As a result, local attackers may be able to execute arbitrary code with elevated privileges, using several different binaries that make use of the vulnerable library. For more information, please see SSRT2257.","impact":"Local attackers can execute arbitrary code with elevated privileges.","resolution":"Apply a patch. You may also wish to see the following douments. HP Tru64 UNIX 5.1A: README:  T64V51AB2-C0041400-14950-ES-20020730\nLocation:  ftp://ftp1.support.compaq.com/public/unix/v5.1a/ HP Tru64 UNIX 5.1: README: T64V51B19-C0136900-14951-ES-20020730\nLocation:   ftp://ftp1.support.compaq.com/public/unix/v5.1/ HP Tru64 UNIX 5.0A: README: T64V50AB17-C0018404-14949-ES-20020730\nLocation:  ftp://ftp1.support.compaq.com/public/unix/v5.0a/ HP Tru64 UNIX 4.0G: README:  T64V40GB17-C0010404-14948-ES-20020730\nLocation:  ftp://ftp1.support.compaq.com/public/unix/v4.0g/ HP Tru64 UNIX 4.0F: README: DUV40FB18-C0067403-14947-ES-20020730\nLocation:  ftp://ftp1.support.compaq.com/public/unix/v4.0f/","workarounds":"","sysaffected":"","thanks":"The CERT/CC thanks the Hewlett-Packard company for their assistance in creating this document. These vulnerabilities were discovered by SNOsoft.","author":"This document was written by Ian A Finlay.","public":["h","t","t","p",":","/","/","f","t","p",".","s","u","p","p","o","r","t",".","c","o","m","p","a","q",".","c","o","m","/","p","a","t","c","h","e","s","/","p","u","b","l","i","c","/","R","e","a","d","m","e","s","/","u","n","i","x","/","d","u","v","4","0","f","b","1","8","-","c","0","0","6","7","4","0","3","-","1","4","9","4","7","-","e","s","-","2","0","0","2","0","7","3","0",".","R","E","A","D","M","E"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-06-25T14:17:37Z","publicdate":"2002-04-17T00:00:00Z","datefirstpublished":"2002-08-30T18:37:01Z","dateupdated":"2002-09-03T15:04:58Z","revision":18,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"7","cam_impact":"20","cam_easeofexploitation":"20","cam_attackeraccessrequired":"10","cam_scorecurrent":"13.125","cam_scorecurrentwidelyknown":"13.125","cam_scorecurrentwidelyknownexploited":"23.625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.125,"vulnote":null}