CERTA-2005-AVI-115
Vulnerability from certfr_avis

Une vulnérabilité présente dans OpenVMS permet à un utilisateur mal intentionné de contourner la politique de sécurité et de porter atteinte à la confidentialité et/ou à l'intégrité des données.

Description

OpenVMS est un système d'exploitation de HP.

Une vulnérabilité présente dans OpenVMS permet à un utilisateur mal intentionné de contourner la politique de sécurité afin d'avoir un accès non autorisé à certaines données ou à des ressources du système vulnérable.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documention).

None
Impacted products
Vendor Product Description
N/A N/A HP OpenVMS Alpha v6.2-x ;
N/A N/A HP OpenVMS Alpha v7.3-2 ;
N/A N/A HP OpenVMS Alpha v7.3-1 ;
N/A N/A HP OpenVMS VAX v6.2-x ;
N/A N/A HP OpenVMS VAX v7.3 ;
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "HP OpenVMS Alpha v6.2-x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenVMS Alpha v7.3-2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenVMS Alpha v7.3-1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenVMS VAX v6.2-x ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "HP OpenVMS VAX v7.3 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nOpenVMS est un syst\u00e8me d\u0027exploitation de HP.\n\nUne vuln\u00e9rabilit\u00e9 pr\u00e9sente dans OpenVMS permet \u00e0 un utilisateur mal\nintentionn\u00e9 de contourner la politique de s\u00e9curit\u00e9 afin d\u0027avoir un acc\u00e8s\nnon autoris\u00e9 \u00e0 certaines donn\u00e9es ou \u00e0 des ressources du syst\u00e8me\nvuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documention).\n",
  "cves": [],
  "initial_release_date": "2005-03-14T00:00:00",
  "last_revision_date": "2005-03-14T00:00:00",
  "links": [],
  "reference": "CERTA-2005-AVI-115",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-03-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation des privil\u00e8ges"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans OpenVMS permet \u00e0 un utilisateur mal\nintentionn\u00e9 de contourner la politique de s\u00e9curit\u00e9 et de porter atteinte\n\u00e0 la confidentialit\u00e9 et/ou \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans OpenVMS",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 HP #HPSBOV01121 du 1er mars 2005",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=HPSBOV01121"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…