Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.vupen.com/english/advisories/2005/2350 | vdb-entry x_refsource_VUPEN |
http://securitytracker.com/id?1015169 | vdb-entry x_refsource_SECTRACK |
https://exchange.xforce.ibmcloud.com/vulnerabilities/22986 | vdb-entry x_refsource_XF |
http://securityreason.com/securityalert/174 | third-party-advisory x_refsource_SREASON |
http://osvdb.org/20673 | vdb-entry x_refsource_OSVDB |
http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08a.html | x_refsource_CONFIRM |
http://secunia.com/advisories/17502 | third-party-advisory x_refsource_SECUNIA |
http://marc.info/?l=bugtraq&m=113199516516880&w=2 | mailing-list x_refsource_BUGTRAQ |
http://www.securityfocus.com/bid/15349 | vdb-entry x_refsource_BID |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.vupen.com/english/advisories/2005/2350 | vdb-entry x_refsource_VUPEN x_transferred |
http://securitytracker.com/id?1015169 | vdb-entry x_refsource_SECTRACK x_transferred |
https://exchange.xforce.ibmcloud.com/vulnerabilities/22986 | vdb-entry x_refsource_XF x_transferred |
http://securityreason.com/securityalert/174 | third-party-advisory x_refsource_SREASON x_transferred |
http://osvdb.org/20673 | vdb-entry x_refsource_OSVDB x_transferred |
http://securityresponse.symantec.com/avcenter/security/Content/2005.11.08a.html | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/17502 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://marc.info/?l=bugtraq&m=113199516516880&w=2 | mailing-list x_refsource_BUGTRAQ x_transferred |
http://www.securityfocus.com/bid/15349 | vdb-entry x_refsource_BID x_transferred |
Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 4.3 | MEDIUM | AV:L/AC:L/Au:S/C:P/I:P/A:P |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |