{"vuid":"VU#584243","idnumber":"584243","name":"HP Tru64 UNIX \"dtsession\" contains buffer overflow (SSRT2282)","keywords":["Compaq","Tru64","dtsession","buffer overflow","_XKB_CHARSET library"],"overview":"The HP Tru64 UNIX implementation of \"dtsession\" contains a locally exploitable buffer overflow.","clean_desc":"From the HP Tru64 UNIX reference pages, the \"dtsession\" utility \"provides ICCCM 1.1 compliant session management functionality during a user's session, the time from login to logout. It launches a window manager and allows for saving a session, restoring a session, locking a session, launching screen savers and allocating colors for desktop compatible clients.\" A locally exploitable buffer overflow in \"dtsession\" may permit a local attacker to gain elevated privileges and execute arbitrary code on a vulnerable host.","impact":"A local user may be able to gain elevated privileges and execute arbitrary code.","resolution":"Apply a patch.","workarounds":"","sysaffected":"","thanks":"Thanks to KF for reporting this vulnerability.","author":"This document was written by Ian A Finlay.","public":["http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11","http://www.tru64unix.compaq.com/docs/base_doc/DOCUMENTATION/V40G_HTML/MAN/MAN1/0592____.HTM"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-07-10T21:06:50Z","publicdate":"2002-08-30T00:00:00Z","datefirstpublished":"2002-09-13T14:14:30Z","dateupdated":"2002-09-13T14:23:51Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"5","cam_impact":"20","cam_easeofexploitation":"20","cam_attackeraccessrequired":"10","cam_scorecurrent":"7.5","cam_scorecurrentwidelyknown":"9.375","cam_scorecurrentwidelyknownexploited":"16.875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.5,"vulnote":null}