CVE-2002-1604
Multiple buffer overflows in HP Tru64 UNIX allow local and possibly remote attackers to execute arbitrary code via a long NLSPATH environment variable to (1) csh, (2) dtsession, (3) dxsysinfo, (4) imapd, (5) inc, (6) uucp, (7) uux, (8) rdist, or (9) deliver.
Published
2002-09-02T04:00:00.000
Last Modified
2025-04-03T01:03:51.193
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 7.5 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
6.4
Weaknesses
-
Type: Primary
NVD-CWE-Other
Affected Vendors & Products
Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
Operating System |
hp
|
hp-ux
|
10.20 |
Yes
|
Operating System |
hp
|
hp-ux
|
11.00 |
Yes
|
Operating System |
hp
|
hp-ux
|
11.04 |
Yes
|
Operating System |
hp
|
hp-ux
|
11.11 |
Yes
|
Operating System |
hp
|
hp-ux
|
11.22 |
Yes
|
Operating System |
hp
|
tru64
|
4.0f |
Yes
|
Operating System |
hp
|
tru64
|
4.0g |
Yes
|
Operating System |
hp
|
tru64
|
5.0a |
Yes
|
Operating System |
hp
|
tru64
|
5.1 |
Yes
|
Operating System |
hp
|
tru64
|
5.1a |
Yes
|
References
-
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
([email protected])
-
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
([email protected])
-
http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11
([email protected])
-
http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_nlspath.txt
Exploit
([email protected])
-
http://www.kb.cert.org/vuls/id/158499
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/416427
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/437899
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/448987
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/531355
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/567963
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/584243
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/592515
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/846307
Third Party Advisory, US Government Resource
([email protected])
-
http://www.securityfocus.com/archive/1/290115
([email protected])
-
http://www.securityfocus.com/bid/5647
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/10016
([email protected])
-
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
(af854a3a-2127-422b-91ae-364da2661108)
-
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
(af854a3a-2127-422b-91ae-364da2661108)
-
http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_nlspath.txt
Exploit
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/158499
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/416427
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/437899
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/448987
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/531355
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/567963
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/584243
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/592515
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/846307
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/archive/1/290115
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/5647
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/10016
(af854a3a-2127-422b-91ae-364da2661108)