search menu icon-carat-right cmu-wordmark

CERT Coordination Center

HP Tru64 UNIX "dxchpwd" contains buffer overflow

Vulnerability Note VU#671627

Original Release Date: 2003-03-21 | Last Revised: 2003-04-15

Overview

The Hewlett Packard Tru64 "dxchpwd" command contains a locally exploitable buffer overflow.

Description

The Hewlett Packard Tru64 operating system contains a command, known as "dxchpwd," that allows users to change passwords. This program is vulnerable to a buffer overflow.

Impact

This vulnerability can be exploited by local non-root users on a machine to cause a denial-of-service condition, or assume the privileges of the root user.

Solution

Hewlett Packard has issued a patch that corrects this vulnerability. More information can be found here.

Vendor Information

671627
 
Affected   Unknown   Unaffected

Hewlett-Packard Company

Updated:  August 13, 2002

Status

  Vulnerable

Vendor Statement

See http://ftp.support.compaq.com/patches/public/Readmes/unix/t64v51b19-c0136900-14951-es-20020730.README.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Acknowledgements

This document was written by Ian A Finlay.

Other Information

CVE IDs: None
Severity Metric: 9.38
Date Public: 2002-08-01
Date First Published: 2003-03-21
Date Last Updated: 2003-04-15 13:58 UTC
Document Revision: 13

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.