Vulnerabilities > CVE-2006-2574 - Local Privilege Escalation vulnerability in Retired: HP-UX Software Distributor
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Multiple unspecified vulnerabilities in Software Distributor in HP-UX B.11.00, B.11.04, B.11.11, and B.11.23 allow local users to gain privileges via unspecified attack vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 4 |
Nessus
NASL family HP-UX Local Security Checks NASL id HPUX_PHCO_34539.NASL description s700_800 11.11 Software Distributor Cumulative Patch : Potential security vulnerabilities have been identified with HP-UX running Software Distributor. These vulnerabilities could be exploited by a local authorized user to gain elevated privileges. last seen 2020-06-01 modified 2020-06-02 plugin id 21649 published 2006-06-06 reporter This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21649 title HP-UX PHCO_34539 : HP-UX Running Software Distributor Local Elevation of Privilege (HPSBUX02114 SSRT061115 rev.1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHCO_34539. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(21649); script_version("1.15"); script_cvs_date("Date: 2018/11/19 11:02:42"); script_cve_id("CVE-2006-2574"); script_xref(name:"HP", value:"emr_na-c00659649"); script_xref(name:"HP", value:"HPSBUX02114"); script_xref(name:"HP", value:"SSRT061115"); script_name(english:"HP-UX PHCO_34539 : HP-UX Running Software Distributor Local Elevation of Privilege (HPSBUX02114 SSRT061115 rev.1)"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.11 Software Distributor Cumulative Patch : Potential security vulnerabilities have been identified with HP-UX running Software Distributor. These vulnerabilities could be exploited by a local authorized user to gain elevated privileges." ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00659649 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?66dde7f3" ); script_set_attribute( attribute:"solution", value:"Install patch PHCO_34539 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2006/05/22"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/06/06"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.11")) { exit(0, "The host is not affected since PHCO_34539 applies to a different OS release."); } patches = make_list("PHCO_34539", "PHCO_35587", "PHCO_38226", "PHCO_41200"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.GZIP", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FRE-I-MSG", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-GER-I-MSG", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-KOR-E-MSG", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-B-MSG", version:"B.11.11.0509.428")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0106")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0109")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0112")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0203")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0206")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0209")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0212")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0303")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0306")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0309")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0312")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0406")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0412")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-TCH-H-MSG", version:"B.11.11.0509.428")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHCO_34814.NASL description s700_800 11.04 (VVOS) Software Distributor (SD) Cuml Patch : Potential security vulnerabilities have been identified with HP-UX running Software Distributor. These vulnerabilities could be exploited by a local authorized user to gain elevated privileges. last seen 2020-06-01 modified 2020-06-02 plugin id 21651 published 2006-06-06 reporter This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21651 title HP-UX PHCO_34814 : HP-UX Running Software Distributor Local Elevation of Privilege (HPSBUX02114 SSRT061115 rev.1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHCO_34814. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(21651); script_version("1.13"); script_cvs_date("Date: 2018/11/19 11:02:42"); script_cve_id("CVE-2006-2574"); script_xref(name:"HP", value:"emr_na-c00659649"); script_xref(name:"HP", value:"HPSBUX02114"); script_xref(name:"HP", value:"SSRT061115"); script_name(english:"HP-UX PHCO_34814 : HP-UX Running Software Distributor Local Elevation of Privilege (HPSBUX02114 SSRT061115 rev.1)"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.04 (VVOS) Software Distributor (SD) Cuml Patch : Potential security vulnerabilities have been identified with HP-UX running Software Distributor. These vulnerabilities could be exploited by a local authorized user to gain elevated privileges." ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00659649 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?66dde7f3" ); script_set_attribute( attribute:"solution", value:"Install patch PHCO_34814 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2006/05/22"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/06/06"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.04")) { exit(0, "The host is not affected since PHCO_34814 applies to a different OS release."); } patches = make_list("PHCO_34814"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.04")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.04")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.04")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FAL", version:"B.11.04")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.04")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.04")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.04")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.04")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.04")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.04")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.04")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHCO_34568.NASL description s700_800 11.00 Software Distributor (SD) Cumulative Patch : Potential security vulnerabilities have been identified with HP-UX running Software Distributor. These vulnerabilities could be exploited by a local authorized user to gain elevated privileges. last seen 2020-06-01 modified 2020-06-02 plugin id 21650 published 2006-06-06 reporter This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/21650 title HP-UX PHCO_34568 : HP-UX Running Software Distributor Local Elevation of Privilege (HPSBUX02114 SSRT061115 rev.1) code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHCO_34568. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(21650); script_version("1.13"); script_cvs_date("Date: 2018/11/19 11:02:42"); script_cve_id("CVE-2006-2574"); script_xref(name:"HP", value:"emr_na-c00659649"); script_xref(name:"HP", value:"HPSBUX02114"); script_xref(name:"HP", value:"SSRT061115"); script_name(english:"HP-UX PHCO_34568 : HP-UX Running Software Distributor Local Elevation of Privilege (HPSBUX02114 SSRT061115 rev.1)"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.00 Software Distributor (SD) Cumulative Patch : Potential security vulnerabilities have been identified with HP-UX running Software Distributor. These vulnerabilities could be exploited by a local authorized user to gain elevated privileges." ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00659649 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?66dde7f3" ); script_set_attribute( attribute:"solution", value:"Install patch PHCO_34568 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"patch_publication_date", value:"2006/05/22"); script_set_attribute(attribute:"plugin_publication_date", value:"2006/06/06"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.00")) { exit(0, "The host is not affected since PHCO_34568 applies to a different OS release."); } patches = make_list("PHCO_34568"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.00")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.10.07")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.10.07.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.10.14")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.00.02")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.00.05")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-AGENT", version:"B.11.11.00.05.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.00")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.10.07")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.10.07.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.10.14")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.00.02")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.00.05")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-CMDS", version:"B.11.11.00.05.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.00")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.10.07")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.10.07.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.10.14")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.00.02")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.00.05")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-ENG-A-MAN", version:"B.11.11.00.05.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FAL", version:"B.11.00")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FAL", version:"B.11.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FAL", version:"B.11.10.07")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FAL", version:"B.11.10.07.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FAL", version:"B.11.10.14")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FAL", version:"B.11.11.00.02")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FAL", version:"B.11.11.00.05")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-FAL", version:"B.11.11.00.05.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.00")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.10.07")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.10.07.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.10.14")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.00.02")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.00.05")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-HELP", version:"B.11.11.00.05.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.00")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.10.07")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.10.07.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.10.14")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.00.02")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.00.05")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-HELP", version:"B.11.11.00.05.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.00")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MAN", version:"B.11.11.00.05.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.00")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.10.07")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.10.07.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.10.14")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.00.02")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.00.05")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-E-MSG", version:"B.11.11.00.05.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.00")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.10.07")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.10.07.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.10.14")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.00.02")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.00.05")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-HELP", version:"B.11.11.00.05.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.00")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MAN", version:"B.11.11.00.05.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.00")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.10.07")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.10.07.01")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.10.14")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.00.02")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.00.05")) flag++; if (hpux_check_patch(app:"SW-DIST.SD-JPN-S-MSG", version:"B.11.11.00.05.01")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
Oval
accepted | 2014-03-24T04:01:42.613-04:00 | ||||||||||||
class | vulnerability | ||||||||||||
contributors |
| ||||||||||||
description | Multiple unspecified vulnerabilities in Software Distributor in HP-UX B.11.00, B.11.04, B.11.11, and B.11.23 allow local users to gain privileges via unspecified attack vectors. | ||||||||||||
family | unix | ||||||||||||
id | oval:org.mitre.oval:def:5568 | ||||||||||||
status | accepted | ||||||||||||
submitted | 2008-07-07T16:38:36.000-04:00 | ||||||||||||
title | HP-UX Running Software Distributor Local Elevation of Privilege | ||||||||||||
version | 41 |
References
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00659649
- http://secunia.com/advisories/20230
- http://secunia.com/advisories/20332
- http://securityreason.com/securityalert/964
- http://securitytracker.com/id?1016139
- http://support.avaya.com/elmodocs2/security/ASA-2006-106.htm
- http://www.securityfocus.com/archive/1/434838/100/0/threaded
- http://www.securityfocus.com/bid/18098
- http://www.vupen.com/english/advisories/2006/1947
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26609
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5568