Vulnerability Note VU#584243

HP Tru64 UNIX "dtsession" contains buffer overflow (SSRT2282)

Original Release date: 13 Sep 2002 | Last revised: 13 Sep 2002


The HP Tru64 UNIX implementation of "dtsession" contains a locally exploitable buffer overflow.


From the HP Tru64 UNIX reference pages, the "dtsession" utility "provides ICCCM 1.1 compliant session management functionality during a user's session, the time from login to logout. It launches a window manager and allows for saving a session, restoring a session, locking a session, launching screen savers and allocating colors for desktop compatible clients." A locally exploitable buffer overflow in "dtsession" may permit a local attacker to gain elevated privileges and execute arbitrary code on a vulnerable host.


A local user may be able to gain elevated privileges and execute arbitrary code.


Apply a patch.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Hewlett-Packard CompanyAffected12 Jul 200213 Sep 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to KF for reporting this vulnerability.

This document was written by Ian A Finlay.

Other Information

  • CVE IDs: Unknown
  • Date Public: 30 Aug 2002
  • Date First Published: 13 Sep 2002
  • Date Last Updated: 13 Sep 2002
  • Severity Metric: 7.50
  • Document Revision: 11


If you have feedback, comments, or additional information about this vulnerability, please send us email.