Vulnerabilities > CVE-2006-4820 - Local Denial of Service vulnerability in HP Hp-Ux 11.00/11.11/11.23

047910
CVSS 2.1 - LOW
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
local
low complexity
hp
nessus

Summary

Unspecified vulnerability in X.25 on HP-UX B.11.00, B.11.11, and B.11.23 allows local users to cause an unspecified denial of service via unknown vectors.

Vulnerable Configurations

Part Description Count
OS
Hp
3

Nessus

  • NASL familyHP-UX Local Security Checks
    NASL idHPUX_PHNE_34009.NASL
    descriptions700_800 11.00 J2793B X.25 SX25-HPerf/SYNC-WAN : A potential security vulnerability has been identified with HP-UX running X.25. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).
    last seen2020-06-01
    modified2020-06-02
    plugin id22430
    published2006-09-22
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22430
    titleHP-UX PHNE_34009 : HP-UX running X.25 Local Denial of Service (Dos) (HPSBUX02126 SSRT051019 rev.1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and patch checks in this plugin were 
    # extracted from HP patch PHNE_34009. The text itself is
    # copyright (C) Hewlett-Packard Development Company, L.P.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(22430);
      script_version("1.12");
      script_cvs_date("Date: 2018/08/10 18:07:07");
    
      script_cve_id("CVE-2006-4820");
      script_xref(name:"HP", value:"emr_na-c00705202");
      script_xref(name:"HP", value:"HPSBUX02126");
      script_xref(name:"HP", value:"SSRT051019");
    
      script_name(english:"HP-UX PHNE_34009 : HP-UX running X.25 Local Denial of Service (Dos) (HPSBUX02126 SSRT051019 rev.1)");
      script_summary(english:"Checks for the patch in the swlist output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote HP-UX host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "s700_800 11.00 J2793B X.25 SX25-HPerf/SYNC-WAN : 
    
    A potential security vulnerability has been identified with HP-UX
    running X.25. The vulnerability could be exploited by a local user to
    create a Denial of Service (DoS)."
      );
      # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705202
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?c543af62"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install patch PHNE_34009 or subsequent."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/09/13");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/09/22");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/09/14");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
      script_family(english:"HP-UX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("hpux.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
    if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    if (!hpux_check_ctx(ctx:"11.00"))
    {
      exit(0, "The host is not affected since PHNE_34009 applies to a different OS release.");
    }
    
    patches = make_list("PHNE_34009");
    foreach patch (patches)
    {
      if (hpux_installed(app:patch))
      {
        exit(0, "The host is not affected because patch "+patch+" is installed.");
      }
    }
    
    
    flag = 0;
    if (hpux_check_patch(app:"SX25-HPerf.COM-32ALIB", version:"7.9")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-32ALIB", version:"8.0")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-32ALIB", version:"8.25")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-32ALIB", version:"8.26")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-32ALIB", version:"8.27")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-32ALIB", version:"8.28")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-32ALIB", version:"8.29")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-32ALIB", version:"8.30")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-32ALIB", version:"8.31")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-32ALIB", version:"8.32")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-32ALIB", version:"8.33")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-32ALIB", version:"8.61")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64ALIB", version:"7.9")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64ALIB", version:"8.0")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64ALIB", version:"8.25")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64ALIB", version:"8.26")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64ALIB", version:"8.27")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64ALIB", version:"8.28")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64ALIB", version:"8.29")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64ALIB", version:"8.30")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64ALIB", version:"8.31")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64ALIB", version:"8.32")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64ALIB", version:"8.33")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64ALIB", version:"8.61")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"7.9")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"8.0")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"8.25")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"8.26")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"8.27")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"8.28")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"8.29")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"8.30")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"8.31")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"8.32")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"8.33")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"8.61")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-32ALIB", version:"7.9")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-32ALIB", version:"8.0")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-32ALIB", version:"8.25")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-32ALIB", version:"8.26")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-32ALIB", version:"8.27")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-32ALIB", version:"8.28")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-32ALIB", version:"8.29")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-32ALIB", version:"8.30")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-32ALIB", version:"8.31")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-32ALIB", version:"8.32")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-32ALIB", version:"8.33")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-32ALIB", version:"8.61")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-64ALIB", version:"7.9")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-64ALIB", version:"8.0")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-64ALIB", version:"8.25")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-64ALIB", version:"8.26")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-64ALIB", version:"8.27")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-64ALIB", version:"8.28")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-64ALIB", version:"8.29")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-64ALIB", version:"8.30")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-64ALIB", version:"8.31")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-64ALIB", version:"8.32")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-64ALIB", version:"8.33")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-64ALIB", version:"8.61")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-32ALIB", version:"7.9")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-32ALIB", version:"8.0")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-32ALIB", version:"8.25")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-32ALIB", version:"8.26")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-32ALIB", version:"8.27")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-32ALIB", version:"8.28")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-32ALIB", version:"8.29")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-32ALIB", version:"8.30")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-32ALIB", version:"8.31")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-32ALIB", version:"8.32")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-32ALIB", version:"8.33")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-32ALIB", version:"8.61")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-64ALIB", version:"7.9")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-64ALIB", version:"8.0")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-64ALIB", version:"8.25")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-64ALIB", version:"8.26")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-64ALIB", version:"8.27")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-64ALIB", version:"8.28")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-64ALIB", version:"8.29")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-64ALIB", version:"8.30")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-64ALIB", version:"8.31")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-64ALIB", version:"8.32")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-64ALIB", version:"8.33")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-64ALIB", version:"8.61")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"7.9")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"8.0")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"8.25")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"8.26")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"8.27")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"8.28")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"8.29")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"8.30")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"8.31")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"8.32")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"8.33")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"8.61")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"7.9")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"8.0")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"8.25")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"8.26")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"8.27")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"8.28")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"8.29")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"8.30")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"8.31")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"8.32")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"8.33")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"8.61")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-MAN", version:"1.21")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-MAN", version:"1.22")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-MAN", version:"1.28")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"7.9")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"8.0")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"8.25")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"8.26")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"8.27")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"8.28")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"8.29")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"8.30")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"8.31")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"8.32")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"8.33")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"8.61")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PAD", version:"10.32")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PAD", version:"10.35")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-SAM", version:"11.X/Rev.6.31.13")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-SAM", version:"11.X/Rev.6.31.9")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-SAM", version:"11.X/Rev.7.00.06")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-SNMP", version:"A.11.00.ic23")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-32ALIB", version:"3.7")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-32ALIB", version:"4.0")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-32ALIB", version:"5.15")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-32ALIB", version:"5.3")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-32ALIB", version:"5.6")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-32ALIB", version:"5.7")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-32ALIB", version:"5.8")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-64ALIB", version:"3.7")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-64ALIB", version:"4.0")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-64ALIB", version:"5.15")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-64ALIB", version:"5.3")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-64ALIB", version:"5.6")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-64ALIB", version:"5.7")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-64ALIB", version:"5.8")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-COM", version:"3.7")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-COM", version:"4.0")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-COM", version:"5.15")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-COM", version:"5.3")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-COM", version:"5.6")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-COM", version:"5.7")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-COM", version:"5.8")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:hpux_report_get());
      else security_note(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyHP-UX Local Security Checks
    NASL idHPUX_PHNE_34999.NASL
    descriptions700_800 11.23 J2793B X.25 SX25-HPerf/SYNC-WAN : A potential security vulnerability has been identified with HP-UX running X.25. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).
    last seen2020-06-01
    modified2020-06-02
    plugin id22434
    published2006-09-22
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22434
    titleHP-UX PHNE_34999 : HP-UX running X.25 Local Denial of Service (Dos) (HPSBUX02126 SSRT051019 rev.1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and patch checks in this plugin were 
    # extracted from HP patch PHNE_34999. The text itself is
    # copyright (C) Hewlett-Packard Development Company, L.P.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(22434);
      script_version("1.12");
      script_cvs_date("Date: 2018/08/10 18:07:07");
    
      script_cve_id("CVE-2006-4820");
      script_xref(name:"HP", value:"emr_na-c00705202");
      script_xref(name:"HP", value:"HPSBUX02126");
      script_xref(name:"HP", value:"SSRT051019");
    
      script_name(english:"HP-UX PHNE_34999 : HP-UX running X.25 Local Denial of Service (Dos) (HPSBUX02126 SSRT051019 rev.1)");
      script_summary(english:"Checks for the patch in the swlist output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote HP-UX host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "s700_800 11.23 J2793B X.25 SX25-HPerf/SYNC-WAN : 
    
    A potential security vulnerability has been identified with HP-UX
    running X.25. The vulnerability could be exploited by a local user to
    create a Denial of Service (DoS)."
      );
      # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705202
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?c543af62"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install patch PHNE_34999 or subsequent."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/09/13");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/09/22");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/09/14");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
      script_family(english:"HP-UX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("hpux.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
    if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    if (!hpux_check_ctx(ctx:"11.23"))
    {
      exit(0, "The host is not affected since PHNE_34999 applies to a different OS release.");
    }
    
    patches = make_list("PHNE_34999");
    foreach patch (patches)
    {
      if (hpux_installed(app:patch))
      {
        exit(0, "The host is not affected because patch "+patch+" is installed.");
      }
    }
    
    
    flag = 0;
    if (hpux_check_patch(app:"SX25-HPerf.COM-ALIB", version:"B.11.23.03")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-ALIB", version:"B.11.23.03")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-ALIB", version:"B.11.23.03")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"B.11.23.03")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-MAN", version:"B.11.23.03")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PAD", version:"B.11.23.03")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-ALIB", version:"B.11.23.03")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:hpux_report_get());
      else security_note(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyHP-UX Local Security Checks
    NASL idHPUX_PHNE_34988.NASL
    descriptions700_800 11.11 J2793B X.25 SX25-HPerf/SYNC-WAN : A potential security vulnerability has been identified with HP-UX running X.25. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).
    last seen2020-06-01
    modified2020-06-02
    plugin id22433
    published2006-09-22
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/22433
    titleHP-UX PHNE_34988 : HP-UX running X.25 Local Denial of Service (Dos) (HPSBUX02126 SSRT051019 rev.1)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and patch checks in this plugin were 
    # extracted from HP patch PHNE_34988. The text itself is
    # copyright (C) Hewlett-Packard Development Company, L.P.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(22433);
      script_version("1.12");
      script_cvs_date("Date: 2018/08/10 18:07:07");
    
      script_cve_id("CVE-2006-4820");
      script_xref(name:"HP", value:"emr_na-c00705202");
      script_xref(name:"HP", value:"HPSBUX02126");
      script_xref(name:"HP", value:"SSRT051019");
    
      script_name(english:"HP-UX PHNE_34988 : HP-UX running X.25 Local Denial of Service (Dos) (HPSBUX02126 SSRT051019 rev.1)");
      script_summary(english:"Checks for the patch in the swlist output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote HP-UX host is missing a security-related patch."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "s700_800 11.11 J2793B X.25 SX25-HPerf/SYNC-WAN : 
    
    A potential security vulnerability has been identified with HP-UX
    running X.25. The vulnerability could be exploited by a local user to
    create a Denial of Service (DoS)."
      );
      # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705202
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?c543af62"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Install patch PHNE_34988 or subsequent."
      );
      script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/09/13");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/09/22");
      script_set_attribute(attribute:"vuln_publication_date", value:"2006/09/14");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
      script_family(english:"HP-UX Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("hpux.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
    if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    if (!hpux_check_ctx(ctx:"11.11"))
    {
      exit(0, "The host is not affected since PHNE_34988 applies to a different OS release.");
    }
    
    patches = make_list("PHNE_34988");
    foreach patch (patches)
    {
      if (hpux_installed(app:patch))
      {
        exit(0, "The host is not affected because patch "+patch+" is installed.");
      }
    }
    
    
    flag = 0;
    if (hpux_check_patch(app:"SX25-HPerf.COM-64SLIB", version:"B.11.11.00")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.COM-ALIB", version:"B.11.11.00")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.IP-ALIB", version:"B.11.11.00")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.PA-ALIB", version:"B.11.11.00")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-COM", version:"B.11.11.00")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-IP", version:"B.11.11.00")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-MAN", version:"B.11.11.00")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PA", version:"B.11.11.00")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-PAD", version:"B.11.11.00")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-HPERF-SAM", version:"B.11.11.00")) flag++;
    if (hpux_check_patch(app:"SX25-HPerf.SX25-SNMP", version:"B.11.11.00")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-ALIB", version:"B.11.11.00")) flag++;
    if (hpux_check_patch(app:"SYNC-WAN.SYNC-COM", version:"B.11.11.00")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:hpux_report_get());
      else security_note(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    

Oval

accepted2014-03-24T04:01:46.111-04:00
classvulnerability
contributors
  • nameMichael Wood
    organizationHewlett-Packard
  • nameMichael Wood
    organizationHewlett-Packard
  • nameSushant Kumar Singh
    organizationHewlett-Packard
  • nameSushant Kumar Singh
    organizationHewlett-Packard
descriptionUnspecified vulnerability in X.25 on HP-UX B.11.00, B.11.11, and B.11.23 allows local users to cause an unspecified denial of service via unknown vectors.
familyunix
idoval:org.mitre.oval:def:5747
statusaccepted
submitted2008-07-10T16:22:35.000-04:00
titleHP-UX running X.25 Local Denial of Service (Dos)
version39