CVE-2002-0585
https://notcve.org/view.php?id=CVE-2002-0585
Unknown vulnerability in ndd for HP-UX 11.11 with certain TRANSPORT patches allows attackers to cause a denial of service. • http://archives.neohapsis.com/archives/hp/2002-q2/0034.html http://www.iss.net/security_center/static/9020.php http://www.securityfocus.com/bid/4680 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5490 •
CVE-2002-0279
https://notcve.org/view.php?id=CVE-2002-0279
The kernel in HP-UX 11.11 does not properly provide arguments for setrlimit, which could allow local attackers to cause a denial of service (kernel panic) and possibly gain privileges. El kernel de HP-UX 11.11 no da argumentos adecuados a setrlimit, lo que podría permitir a atacantes locales causar una denegación (kernel panic - pánico del kernel) y posiblemente ganar privilegios. • http://marc.info/?l=bugtraq&m=101372194225046&w=2 http://www.iss.net/security_center/static/8195.php http://www.kb.cert.org/vuls/id/726187 http://www.securityfocus.com/bid/4094 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5469 •
CVE-2001-1564
https://notcve.org/view.php?id=CVE-2001-1564
setrlimit in HP-UX 10.01, 10.10, 10.24, 10.20, 11.00, 11.04 and 11.11 does not properly enforce core file size on processes after setuid or setgid privileges are dropped, which could allow local users to cause a denial of service by exhausting available disk space. • http://archives.neohapsis.com/archives/hp/2001-q3/0000.html http://www.iss.net/security_center/static/6810.php http://www.securityfocus.com/bid/3416 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5159 •
CVE-2001-1198
https://notcve.org/view.php?id=CVE-2001-1198
RLPDaemon in HP-UX 10.20 and 11.0 allows local users to overwrite arbitrary files and gain privileges by specifying the target file in the -L option. RLPDaemon en HP-UX 10.20 y 11.0 permite a usuarios locales la sobreescritura de ficheros arbitrarios y la obtención de privilegios, especificando el fichero objeto en la opción '-L'. • http://www.iss.net/security_center/static/7729.php http://www.securityfocus.com/archive/1/245690 http://www.securityfocus.com/bid/3701 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5763 •
CVE-2001-0797 – System V Derived /bin/login - Extraneous Arguments Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0797
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin. Desbordamiento de búfer en la entrada a varios sistemas operativos basados en System V, permite a atacantes remotos la ejecución de comandos arbitrarios mediante un gran número de argumentos a través de servicios como telnet y rlogin. • https://www.exploit-db.com/exploits/16928 https://www.exploit-db.com/exploits/346 https://www.exploit-db.com/exploits/716 https://www.exploit-db.com/exploits/57 https://www.exploit-db.com/exploits/9917 https://www.exploit-db.com/exploits/16327 https://www.exploit-db.com/exploits/10036 https://www.exploit-db.com/exploits/21179 ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/ •