First published: Sat Aug 31 2002(Updated: )
Buffer overflow in ypmatch in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HP Tru64 | =4.0g | |
HP Tru64 | =5.0a | |
HP Tru64 | =4.0f | |
HPE HP-UX | =11.11 | |
HP Tru64 | =5.1a | |
HPE HP-UX | =11.04 | |
HPE HP-UX | =11.00 | |
HP Tru64 | =5.1 | |
HPE HP-UX | =11.22 | |
HPE HP-UX | =10.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1607 has a high severity rating due to its potential for local users to execute arbitrary code.
CVE-2002-1607 affects local users on HP Tru64 UNIX versions 4.0f, 4.0g, 5.0a, 5.1, and 5.1a.
To fix CVE-2002-1607, apply the appropriate security patches provided by HP for affected versions of Tru64 UNIX.
CVE-2002-1607 is caused by a buffer overflow in the ypmatch command.
CVE-2002-1607 cannot be exploited remotely as it requires local access to the affected system.