|
[ Message Precedent sur la mailing][ Message Suivant sur la mailing][ Precedent dans le fil][ Prochain dans le fil][ Index par Date][ Index par fil]
[SA32544] HP System Management Homepage Unspecified Privilege Escalation
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details:
link://[click]
TITLE:
HP System Management Homepage Unspecified Privilege Escalation
SECUNIA ADVISORY ID:
SA32544
VERIFY ADVISORY:
link://[click]
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
Local system
SOFTWARE:
HP System Management Homepage 2.x
link://[click]
DESCRIPTION:
A vulnerability has been reported in HP System Management Homepage
(SMH), which can be exploited by malicious, local users to perform
certain actions with escalated privileges.
The vulnerability is caused due to an unspecified error, which can be
exploited to e.g. create a local unauthorized access.
The vulnerability is reported in HP SMH version 2.2.6 and earlier
running on HP-UX B.11.11 and B.11.23, and HP SMH version 2.2.6,
2.2.8, and earlier running on HP-UX B.11.23 and B.11.31.
SOLUTION:
Apply updates.
-- HP-UX B.11.11 --
Install SMH 2.2.9.1 or subsequent.
link://[click]
-- HP-UX B.11.23 --
Install SMH 2.2.9.1 or subsequent.
link://[click]
-- HP-UX B.11.31 --
Install 2.2.9.1 or subsequent.
link://[click]
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
HPSBMA02380 SSRT080121:
link://[click]
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
link://[click]
Definitions: (Criticality, Where etc.)
link://[click]
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|