CERTA-2005-AVI-112
Vulnerability from certfr_avis
None
Description
Selon HP, un utilisateur local mal intentionné peut par le biais de l'interface de communication inter-processus basé sur les files de messages, réaliser un déni de service sur le système vulnérable.
Solution
Pour l'obtention des correctifs consulter le bulletin de sécurité de l'éditeur (cf. section Documentation).
HP Tru64 UNIX versions V4.0F, V4.0G, V5.1A, V5.1B-1, V5.1B-2.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eHP Tru64 UNIX versions V4.0F, V4.0G, V5.1A, V5.1B-1, V5.1B-2.\u003c/p\u003e",
"content": "## Description\n\nSelon HP, un utilisateur local mal intentionn\u00e9 peut par le biais de\nl\u0027interface de communication inter-processus bas\u00e9 sur les files de\nmessages, r\u00e9aliser un d\u00e9ni de service sur le syst\u00e8me vuln\u00e9rable.\n\n## Solution\n\nPour l\u0027obtention des correctifs consulter le bulletin de s\u00e9curit\u00e9 de\nl\u0027\u00e9diteur (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2005-03-14T00:00:00",
"last_revision_date": "2005-03-14T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 HPSBTU01109 de Hewlett-Packard \"HP Tru64 UNIX message queue, local denial of service (DOS)\" du 08 mars 2005 :",
"url": "http://itrc.hp.com"
}
],
"reference": "CERTA-2005-AVI-112",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": null,
"title": "D\u00e9ni de service sous HP Tru64 Unix",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HPSBTU01109 de HP",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…