CVE-2002-1606
Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain privileges via (1) lpc, (2) lpd, (3) lpq, (4) lpr, or (5) lprm.
Published
2002-08-30T04:00:00.000
Last Modified
2025-04-03T01:03:51.193
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 4.6 (MEDIUM)
CVSSv2 Vector
AV:L/AC:L/Au:N/C:P/I:P/A:P
- Access Vector: LOCAL
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
3.9
Impact Score
6.4
Weaknesses
-
Type: Primary
NVD-CWE-Other
Affected Vendors & Products
Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
Operating System |
hp
|
hp-ux
|
10.20 |
Yes
|
Operating System |
hp
|
hp-ux
|
11.00 |
Yes
|
Operating System |
hp
|
hp-ux
|
11.04 |
Yes
|
Operating System |
hp
|
hp-ux
|
11.11 |
Yes
|
Operating System |
hp
|
hp-ux
|
11.22 |
Yes
|
Operating System |
hp
|
tru64
|
4.0f |
Yes
|
Operating System |
hp
|
tru64
|
4.0g |
Yes
|
Operating System |
hp
|
tru64
|
5.0a |
Yes
|
Operating System |
hp
|
tru64
|
5.1 |
Yes
|
Operating System |
hp
|
tru64
|
5.1a |
Yes
|
References
-
http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11
([email protected])
-
http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11
([email protected])
-
http://www.kb.cert.org/vuls/id/293305
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/557481
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/651377
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/955065
Third Party Advisory, US Government Resource
([email protected])
-
http://www.kb.cert.org/vuls/id/965097
Third Party Advisory, US Government Resource
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/10016
([email protected])
-
http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11
(af854a3a-2127-422b-91ae-364da2661108)
-
http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/293305
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/557481
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/651377
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/955065
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.kb.cert.org/vuls/id/965097
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/10016
(af854a3a-2127-422b-91ae-364da2661108)