First published: Wed Sep 03 2003(Updated: )
ssh on HP Tru64 UNIX 5.1B and 5.1A does not properly handle RSA signatures when digital certificates and RSA keys are used, which could allow local and remote attackers to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Compaq Tru64 UNIX | =5.1a_pk4_bl21 | |
Compaq Tru64 UNIX | =5.1a_pk3_bl3 | |
Compaq Tru64 UNIX | =5.1b_pk2_bl22 | |
Compaq Tru64 UNIX | =5.1a | |
Compaq Tru64 UNIX | =5.1a_pk5_bl23 | |
Compaq Tru64 UNIX | =5.1a_pk2_bl2 | |
Compaq Tru64 UNIX | =5.1a_pk1_bl1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0724 is considered a high severity vulnerability due to its potential for privilege escalation.
To fix CVE-2003-0724, update your HP Tru64 UNIX system to apply the necessary security patches provided by Compaq.
CVE-2003-0724 affects users of HP Tru64 UNIX versions 5.1A and 5.1B, specifically the specified patch levels.
Local and remote attackers can exploit CVE-2003-0724 to gain elevated privileges on affected systems.
CVE-2003-0724 was discovered in the year 2003 and reported publicly thereafter.