Secunia Security Advisory - A vulnerability has been reported in HP Enterprise Cluster Master Toolkit (ECMT), which can be exploited by malicious, local users to bypass certain security restrictions.
36e9f698719ef0f978f2781d61d8e6a2826d8a095e5f4f0c8dc26d04609387d6
----------------------------------------------------------------------
Secunia integrated with Microsoft WSUS
http://secunia.com/blog/71/
----------------------------------------------------------------------
TITLE:
HP Enterprise Cluster Master Toolkit Unauthorised Access
SECUNIA ADVISORY ID:
SA38423
VERIFY ADVISORY:
http://secunia.com/advisories/38423/
DESCRIPTION:
A vulnerability has been reported in HP Enterprise Cluster Master
Toolkit (ECMT), which can be exploited by malicious, local users to
bypass certain security restrictions.
The vulnerability is caused due to an unspecified error, which can be
exploited to gain unauthorised access e.g. to a database managed by
Oracle 9i, 10gR1, 10gR2, 11gR1 or Sybase AES 15.0.2 or later.
The vulnerability is reported in ECMT B.05.00 running on HP-UX
B.11.23 (11i v2) or HP-UX B.11.31 (11i v3).
SOLUTION:
Apply patches.
B.11.23 (11i v2):
Apply PHSS_40229 or later.
B.11.31 (11i v3):
Apply PHSS_40230 or later.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
HPSBUX02464 SSRT090210:
http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01894850
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------