Secunia Security Advisory - A vulnerability has been reported in HP-UX, which can be exploited by malicious people to gain escalated privileges.
c463bdce720ae1c897de44367222697c37428b759ee3f37a45b89b042967cd55
----------------------------------------------------------------------
Secunia customers receive relevant and filtered advisories.
Delivery is done via different channels including SMS, Email, Web,
and https based XML feed.
http://corporate.secunia.com/trial/38/request/
----------------------------------------------------------------------
TITLE:
HP-UX Portable File System Unspecified Privilege Escalation
SECUNIA ADVISORY ID:
SA24855
VERIFY ADVISORY:
http://secunia.com/advisories/24855/
CRITICAL:
Less critical
IMPACT:
Privilege escalation
WHERE:
>From local network
OPERATING SYSTEM:
HP-UX 11.x
http://secunia.com/product/138/
DESCRIPTION:
A vulnerability has been reported in HP-UX, which can be exploited by
malicious people to gain escalated privileges.
The vulnerability is caused due to an unspecified error within the
Portable File System (PFS). No further information is available.
The vulnerability is reported in versions HP-UX B.11.00 (obsolete),
B.11.11 and B.11.23.
NOTE: PFS is reportedly obsolete since 2004-03-01 and no longer
supported on any HP-UX release, but is supplied with HP-UX B.11.00,
B.11.11, and B.11.23.
SOLUTION:
Use the enhanced CDFS and mount/umount commands by applying the
patches. The vendor also recommends discontinuing the use of PFS.
HP-UX B.11.00:
Install PHKL_28060, PHKL_26450, PHCO_26449 or subsequent, discontinue
use of PFS.
HP-UX B.11.11:
Install PHKL_28025, PHKL_26269, PHCO_25841 or subsequent, discontinue
use of PFS.
HP-UX B.11.23:
Discontinue use of PFS.
PROVIDED AND/OR DISCOVERED BY:
The vendor credits iDefense Labs.
ORIGINAL ADVISORY:
HPSBUX02203 SSRT071339:
https://www5.itrc.hp.com/service/cki/docDisplay.do?admit=-1335382922+1176288056779+28353475&docId=c00913684
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------