Secunia Security Advisory - A vulnerability has been reported in OpenVMS, which can be exploited by malicious, local users to gain escalated privileges.
c5c92f62bf19912d532bbd512c230d86bec163b50caa4effd2ea6d6a41e0bf3a
----------------------------------------------------------------------
Secunia integrated with Microsoft WSUS
http://secunia.com/blog/71/
----------------------------------------------------------------------
TITLE:
OpenVMS RMS Privilege Escalation Vulnerability
SECUNIA ADVISORY ID:
SA38366
VERIFY ADVISORY:
http://secunia.com/advisories/38366/
DESCRIPTION:
A vulnerability has been reported in OpenVMS, which can be exploited
by malicious, local users to gain escalated privileges.
The vulnerability is caused due to an unspecified error in the RMS
(Record Management Services) implementation on ALPHA platforms and
can be exploited to execute arbitrary code with elevated privileges.
The vulnerability is reported in systems having RMS patch kit
VMS83A_RMS-V1000 or update kit VMS83A_UPDATE-V1100 installed.
SOLUTION:
Install patch kit VMS83A_RMS-V1100:
http://itrc.hp.com
The vulnerability is also fixed in VMS83A_UPDATE-V1200.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
HPSBOV02505 SSRT100023:
http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02001423
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------