First published: Mon Oct 23 2006(Updated: )
Buffer overflow in dtmail on HP Tru64 UNIX 4.0F through 5.1B and HP-UX B.11.00 through B.11.23 allows local users to execute arbitrary code via a long -a (aka attachment) argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HP Tru64 | =4.0g | |
HP Tru64 | =5.0a | |
HP Tru64 | =5.1af | |
HP Tru64 | =4.0f | |
HPE HP-UX | =11.11 | |
HP Tru64 | =5.1a | |
HP Tru64 | =4.0f-pk8 | |
HP Tru64 | =5.1b3 | |
HPE HP-UX | =11.4 | |
HP Tru64 | =5.1b-pk1 | |
HP Tru64 | =5.1a-pk6 | |
HPE HP-UX | =11.00 | |
HPE HP-UX | =11.23 | |
HP Tru64 | =5.1 | |
HPE HP-UX | =11.22 | |
HP Tru64 | =4.0g-pk4 | |
HP Tru64 | =5.1b2-pk4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-5452 is classified as high due to its ability to allow local users to execute arbitrary code.
To fix CVE-2006-5452, it is recommended to apply the latest patches released by HP for affected versions of Tru64 UNIX and HP-UX.
CVE-2006-5452 affects HP Tru64 UNIX versions 4.0F through 5.1B and HP-UX versions B.11.00 through B.11.23.
In the context of CVE-2006-5452, a buffer overflow occurs when the dtmail command can be exploited to overwrite memory due to a long -a argument.
Local users on systems running vulnerable versions of HP Tru64 UNIX and HP-UX are impacted by CVE-2006-5452.