Vulnerabilities > CVE-1999-0353 - Unspecified vulnerability in HP Hp-Ux
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN hp
nessus
Summary
rpc.pcnfsd in HP gives remote root access by changing the permissions on the main printer spool directory.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 4 |
Nessus
NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_16470.NASL description s700_800 11.0 ONC cumulative patch : rpc.pcnfsd has an error in its use of the spool directory. last seen 2020-06-01 modified 2020-06-02 plugin id 16628 published 2005-02-16 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/16628 title HP-UX PHNE_16470 : s700_800 11.0 ONC cumulative patch code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHNE_16470. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(16628); script_version("1.13"); script_cvs_date("Date: 2018/08/10 18:07:07"); script_cve_id("CVE-1999-0353"); script_xref(name:"HP", value:"HPSBUX9902-091"); script_name(english:"HP-UX PHNE_16470 : s700_800 11.0 ONC cumulative patch"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.0 ONC cumulative patch : rpc.pcnfsd has an error in its use of the spool directory." ); script_set_attribute( attribute:"solution", value:"Install patch PHNE_16470 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"1998/11/30"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/02/16"); script_set_attribute(attribute:"vuln_publication_date", value:"1999/02/08"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.00")) { exit(0, "The host is not affected since PHNE_16470 applies to a different OS release."); } patches = make_list("PHNE_16470", "PHNE_17101", "PHNE_17200", "PHNE_18221", "PHNE_19620", "PHNE_20371", "PHNE_21376", "PHNE_22125", "PHNE_22642", "PHNE_23249", "PHNE_23833", "PHNE_24034", "PHNE_24909", "PHNE_25484", "PHNE_25626", "PHNE_26387", "PHNE_27217", "PHNE_28102", "PHNE_28567", "PHNE_28982", "PHNE_29210", "PHNE_29302", "PHNE_29785", "PHNE_29882", "PHNE_30377", "PHNE_30660", "PHNE_31096"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"InternetSrvcs.INETSVCS-INETD", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.KEY-CORE", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NFS-64ALIB", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NFS-64SLIB", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NFS-CLIENT", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NFS-CORE", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NFS-ENG-A-MAN", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NFS-KRN", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NFS-PRG", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NFS-SERVER", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NFS-SHLIBS", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NIS-CLIENT", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NIS-CORE", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NIS-SERVER", version:"B.11.00")) flag++; if (hpux_check_patch(app:"NFS.NISPLUS-CORE", version:"B.11.00")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHCO_16629.NASL description s700_800 11.00 libc cumulative patch : rpc.pcnfsd has an error in its use of the spool directory. last seen 2020-06-01 modified 2020-06-02 plugin id 17371 published 2005-03-18 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/17371 title HP-UX PHCO_16629 : s700_800 11.00 libc cumulative patch code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHCO_16629. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(17371); script_version("1.14"); script_cvs_date("Date: 2018/08/10 18:07:07"); script_cve_id("CVE-1999-0353"); script_xref(name:"HP", value:"HPSBUX9902-091"); script_name(english:"HP-UX PHCO_16629 : s700_800 11.00 libc cumulative patch"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.00 libc cumulative patch : rpc.pcnfsd has an error in its use of the spool directory." ); script_set_attribute( attribute:"solution", value:"Install patch PHCO_16629 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"1998/11/18"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/03/18"); script_set_attribute(attribute:"vuln_publication_date", value:"1999/02/08"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.00")) { exit(0, "The host is not affected since PHCO_16629 applies to a different OS release."); } patches = make_list("PHCO_16629", "PHCO_17601", "PHCO_18103", "PHCO_18227", "PHCO_19090", "PHCO_19391", "PHCO_19491", "PHCO_19691", "PHCO_20555", "PHCO_20765", "PHCO_22076", "PHCO_22314", "PHCO_22923", "PHCO_23770", "PHCO_24148", "PHCO_24723", "PHCO_25707", "PHCO_25976", "PHCO_27608", "PHCO_27731", "PHCO_27774", "PHCO_28425", "PHCO_29284", "PHCO_29633", "PHCO_29956", "PHCO_32448", "PHCO_33609"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"OS-Core.C-MIN", version:"B.11.00")) flag++; if (hpux_check_patch(app:"OS-Core.C-MIN-64ALIB", version:"B.11.00")) flag++; if (hpux_check_patch(app:"OS-Core.CORE-64SLIB", version:"B.11.00")) flag++; if (hpux_check_patch(app:"OS-Core.CORE-SHLIBS", version:"B.11.00")) flag++; if (hpux_check_patch(app:"ProgSupport.PROG-AUX", version:"B.11.00")) flag++; if (hpux_check_patch(app:"ProgSupport.PROG-AX-64ALIB", version:"B.11.00")) flag++; if (hpux_check_patch(app:"ProgSupport.PROG-MIN", version:"B.11.00")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHCO_14625.NASL description s700_800 11.00 bdf(1M) patch to skip autofs file systems : rpc.pcnfsd has an error in its use of the spool directory. last seen 2020-06-01 modified 2020-06-02 plugin id 17370 published 2005-03-18 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/17370 title HP-UX PHCO_14625 : s700_800 11.00 bdf(1M) patch to skip autofs file systems NASL family HP-UX Local Security Checks NASL id HPUX_PHKL_15689.NASL description s700_800 11.0 AutoFS support patch : rpc.pcnfsd has an error in its use of the spool directory. last seen 2020-06-01 modified 2020-06-02 plugin id 17391 published 2005-03-18 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/17391 title HP-UX PHKL_15689 : s700_800 11.0 AutoFS support patch