search menu icon-carat-right cmu-wordmark

CERT Coordination Center

HP Tru64 UNIX "dxchpwd" contains buffer overflow

Vulnerability Note VU#671627

Original Release Date: 2003-03-21 | Last Revised: 2003-04-15


The Hewlett Packard Tru64 "dxchpwd" command contains a locally exploitable buffer overflow.


The Hewlett Packard Tru64 operating system contains a command, known as "dxchpwd," that allows users to change passwords. This program is vulnerable to a buffer overflow.


This vulnerability can be exploited by local non-root users on a machine to cause a denial-of-service condition, or assume the privileges of the root user.


Hewlett Packard has issued a patch that corrects this vulnerability. More information can be found here.

Vendor Information

Affected   Unknown   Unaffected

Hewlett-Packard Company

Updated:  August 13, 2002



Vendor Statement


Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A



This document was written by Ian A Finlay.

Other Information

CVE IDs: None
Severity Metric: 9.38
Date Public: 2002-08-01
Date First Published: 2003-03-21
Date Last Updated: 2003-04-15 13:58 UTC
Document Revision: 13

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.