First published: Fri Oct 27 2006(Updated: )
Stack-based buffer overflow in the (1) swpackage and (2) swmodify commands in HP-UX B.11.11 and possibly other versions allows local users to execute arbitrary code via a long -S argument. NOTE: this might be a duplicate of CVE-2006-2574, but the details relating to CVE-2006-2574 are too vague to be certain.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HPE HP-UX | =11.11 | |
HPE HP-UX | =11.4 | |
HPE HP-UX | =11.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5557 is classified as a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2006-5557, users should apply the latest security patches provided by HPE for affected versions of HP-UX.
CVE-2006-5557 affects local users of HP-UX versions 11.00, 11.11, and 11.4.
CVE-2006-5557 is caused by a stack-based buffer overflow in the swpackage and swmodify commands due to improper handling of long -S arguments.
CVE-2006-5557 may be a duplicate of CVE-2006-2574, although the details of the latter are less clear.