Vulnerabilities > CVE-2005-3564 - Unspecified vulnerability in HP Hp-Ux 11.00/11.11
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN hp
nessus
Summary
envd daemon in HP-UX B.11.00 through B.11.11 allows local users to obtain privileges via unknown attack vectors.
Nessus
NASL family HP-UX Local Security Checks NASL id HPUX_PHCO_33967.NASL description s700_800 11.11 envd(1m) cumulative patch : A potential vulnerability has been identified with HP-UX running the envd(1M). The vulnerability could be exploited by a local authorized user to execute arbitrary code and/or gain unauthorized privileges. last seen 2020-06-01 modified 2020-06-02 plugin id 20199 published 2005-11-15 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20199 title HP-UX PHCO_33967 : HP-UX envd, Local Execution of Privileged Code (HPSBUX02073 SSRT051012 rev.2) code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHCO_33967. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(20199); script_version("1.12"); script_cvs_date("Date: 2018/08/10 18:07:07"); script_cve_id("CVE-2005-3564"); script_xref(name:"HP", value:"emr_na-c00547561"); script_xref(name:"HP", value:"HPSBUX02073"); script_xref(name:"HP", value:"SSRT051012"); script_name(english:"HP-UX PHCO_33967 : HP-UX envd, Local Execution of Privileged Code (HPSBUX02073 SSRT051012 rev.2)"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.11 envd(1m) cumulative patch : A potential vulnerability has been identified with HP-UX running the envd(1M). The vulnerability could be exploited by a local authorized user to execute arbitrary code and/or gain unauthorized privileges." ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00547561 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?72a36760" ); script_set_attribute( attribute:"solution", value:"Install patch PHCO_33967 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2007/08/08"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/11/15"); script_set_attribute(attribute:"vuln_publication_date", value:"2005/11/09"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.11")) { exit(0, "The host is not affected since PHCO_33967 applies to a different OS release."); } patches = make_list("PHCO_33967"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"OS-Core.CORE-ENG-A-MAN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"OS-Core.UX-CORE", version:"B.11.11")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHCO_33989.NASL description s700_800 11.00 envd(1M) cumulative patch : A potential vulnerability has been identified with HP-UX running the envd(1M). The vulnerability could be exploited by a local authorized user to execute arbitrary code and/or gain unauthorized privileges. last seen 2020-06-01 modified 2020-06-02 plugin id 20200 published 2005-11-15 reporter This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20200 title HP-UX PHCO_33989 : HP-UX envd, Local Execution of Privileged Code (HPSBUX02073 SSRT051012 rev.2) code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHCO_33989. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(20200); script_version("1.12"); script_cvs_date("Date: 2018/08/10 18:07:07"); script_cve_id("CVE-2005-3564"); script_xref(name:"HP", value:"emr_na-c00547561"); script_xref(name:"HP", value:"HPSBUX02073"); script_xref(name:"HP", value:"SSRT051012"); script_name(english:"HP-UX PHCO_33989 : HP-UX envd, Local Execution of Privileged Code (HPSBUX02073 SSRT051012 rev.2)"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.00 envd(1M) cumulative patch : A potential vulnerability has been identified with HP-UX running the envd(1M). The vulnerability could be exploited by a local authorized user to execute arbitrary code and/or gain unauthorized privileges." ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00547561 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?72a36760" ); script_set_attribute( attribute:"solution", value:"Install patch PHCO_33989 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2007/08/08"); script_set_attribute(attribute:"plugin_publication_date", value:"2005/11/15"); script_set_attribute(attribute:"vuln_publication_date", value:"2005/11/09"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.00")) { exit(0, "The host is not affected since PHCO_33989 applies to a different OS release."); } patches = make_list("PHCO_33989"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"OS-Core.CORE-ENG-A-MAN", version:"B.11.00")) flag++; if (hpux_check_patch(app:"OS-Core.UX-CORE", version:"B.11.00")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
Oval
accepted 2010-09-20T04:00:11.619-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Todd Dolinsky organization Opsware, Inc. name Jonathan Baker organization The MITRE Corporation
description envd daemon in HP-UX B.11.00 through B.11.11 allows local users to obtain privileges via unknown attack vectors. family unix id oval:org.mitre.oval:def:1429 status accepted submitted 2005-11-30T12:00:00.000-04:00 title HP-UX envd Local Execution of Privileged Code (B.11.00) version 38 accepted 2014-03-24T04:00:39.813-04:00 class vulnerability contributors name Robert L. Hollis organization ThreatGuard, Inc. name Todd Dolinsky organization Opsware, Inc. name Michael Wood organization Hewlett-Packard name Sushant Kumar Singh organization Hewlett-Packard
description envd daemon in HP-UX B.11.00 through B.11.11 allows local users to obtain privileges via unknown attack vectors. family unix id oval:org.mitre.oval:def:1572 status accepted submitted 2005-11-30T12:00:00.000-04:00 title HP-UX envd, Local Execution of Privileged Code version 41
References
- http://secunia.com/advisories/17506
- http://secunia.com/advisories/17506
- http://securitytracker.com/id?1015172
- http://securitytracker.com/id?1015172
- http://www.osvdb.org/20678
- http://www.osvdb.org/20678
- http://www.securityfocus.com/bid/15359
- http://www.securityfocus.com/bid/15359
- http://www.vupen.com/english/advisories/2005/2357
- http://www.vupen.com/english/advisories/2005/2357
- http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00547561
- http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00547561
- http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00547561
- http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00547561
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23039
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23039
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1429
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1429
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1572
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1572