CVE-2002-1616

Multiple buffer overflows in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allow local users to gain root privileges via (1) su, (2) chsh, (3) passwd, (4) chfn, (5) dxchpwd, and (6) libc.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt Exploit
http://www.kb.cert.org/vuls/id/137555 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/177067 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/193347 Patch US Government Resource
http://www.kb.cert.org/vuls/id/671627 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/864083 US Government Resource
http://www.securityfocus.com/archive/1/290115 Vendor Advisory
http://www.securityfocus.com/bid/5379 Vendor Advisory
http://www.securityfocus.com/bid/5380 Patch
http://www.securityfocus.com/bid/5381 Patch
http://www.securityfocus.com/bid/5382 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/10614
https://exchange.xforce.ibmcloud.com/vulnerabilities/11620
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
http://archives.neohapsis.com/archives/fulldisclosure/2002-q3/1203.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://archives.neohapsis.com/archives/tru64/2002-q3/0019.html
http://www.blacksheepnetworks.com/security/hack/tru64/TRU64_su.txt Exploit
http://www.kb.cert.org/vuls/id/137555 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/177067 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/193347 Patch US Government Resource
http://www.kb.cert.org/vuls/id/671627 Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/864083 US Government Resource
http://www.securityfocus.com/archive/1/290115 Vendor Advisory
http://www.securityfocus.com/bid/5379 Vendor Advisory
http://www.securityfocus.com/bid/5380 Patch
http://www.securityfocus.com/bid/5381 Patch
http://www.securityfocus.com/bid/5382 Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/10614
https://exchange.xforce.ibmcloud.com/vulnerabilities/11620
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:hp:tru64:4.0f:*:*:*:*:*:*:*
cpe:2.3:o:hp:tru64:4.0g:*:*:*:*:*:*:*
cpe:2.3:o:hp:tru64:5.0a:*:*:*:*:*:*:*
cpe:2.3:o:hp:tru64:5.1:*:*:*:*:*:*:*
cpe:2.3:o:hp:tru64:5.1af:*:*:*:*:*:*:*

History

No history.

Information

Published : 2002-08-01 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2002-1616

Mitre link : CVE-2002-1616

CVE.ORG link : CVE-2002-1616


JSON object : View

Products Affected

hp

  • tru64