Vulnerabilities > CVE-2007-4125 - Unspecified vulnerability in HP Hp-Ux 11.11/11.23/11.31
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN hp
nessus
Summary
Unspecified vulnerability in the Address and Routing Parameter Area (ARPA) transport functionality in HP-UX B.11.11, B.11.23, and B.11.31 allows remote attackers to cause an unspecified denial of service via unknown vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 3 |
Nessus
NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_35766.NASL description s700_800 11.23 cumulative ARPA Transport patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running IPFilter. The vulnerability could be remotely exploited to create a Denial of Service (DoS). (HPSBUX02181 SSRT061289) - A potential security vulnerability has been identified with HP-UX running ARPA Transport. The vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBUX02248 SSRT071437) - A potential security vulnerability has been identified with HP-UX running ARPA Transport. The vulnerability could be exploited locally by an authorized user to create a Denial of Service (DoS). (HPSBUX02247 SSRT071432) - A potential security vulnerability has been identified with HP-UX running TCP/IP (IPv4). This vulnerability could be remotely exploited to cause a Denial of Service (DoS). (HPSBUX01137 SSRT5954) last seen 2020-06-01 modified 2020-06-02 plugin id 26137 published 2007-09-25 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/26137 title HP-UX PHNE_35766 : s700_800 11.23 cumulative ARPA Transport patch code # # (C) Tenable Network Security, Inc. # # The descriptive text and patch checks in this plugin were # extracted from HP patch PHNE_35766. The text itself is # copyright (C) Hewlett-Packard Development Company, L.P. # include("compat.inc"); if (description) { script_id(26137); script_version("1.22"); script_cvs_date("Date: 2019/07/10 16:04:13"); script_cve_id("CVE-2005-1192", "CVE-2007-0396", "CVE-2007-4125", "CVE-2007-4179"); script_xref(name:"HP", value:"emr_na-c00571568"); script_xref(name:"HP", value:"emr_na-c00837319"); script_xref(name:"HP", value:"emr_na-c01087206"); script_xref(name:"HP", value:"emr_na-c01090656"); script_xref(name:"HP", value:"HPSBUX01137"); script_xref(name:"HP", value:"HPSBUX02181"); script_xref(name:"HP", value:"HPSBUX02247"); script_xref(name:"HP", value:"HPSBUX02248"); script_xref(name:"HP", value:"SSRT061289"); script_xref(name:"HP", value:"SSRT071432"); script_xref(name:"HP", value:"SSRT071437"); script_xref(name:"HP", value:"SSRT5954"); script_name(english:"HP-UX PHNE_35766 : s700_800 11.23 cumulative ARPA Transport patch"); script_summary(english:"Checks for the patch in the swlist output"); script_set_attribute( attribute:"synopsis", value:"The remote HP-UX host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "s700_800 11.23 cumulative ARPA Transport patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running IPFilter. The vulnerability could be remotely exploited to create a Denial of Service (DoS). (HPSBUX02181 SSRT061289) - A potential security vulnerability has been identified with HP-UX running ARPA Transport. The vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBUX02248 SSRT071437) - A potential security vulnerability has been identified with HP-UX running ARPA Transport. The vulnerability could be exploited locally by an authorized user to create a Denial of Service (DoS). (HPSBUX02247 SSRT071432) - A potential security vulnerability has been identified with HP-UX running TCP/IP (IPv4). This vulnerability could be remotely exploited to cause a Denial of Service (DoS). (HPSBUX01137 SSRT5954)" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00571568 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?9aacfc53" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00837319 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?eba492d0" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01090656 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?3f1967b3" ); # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01087206 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?25a0872a" ); script_set_attribute( attribute:"solution", value:"Install patch PHNE_35766 or subsequent." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux"); script_set_attribute(attribute:"vuln_publication_date", value:"2005/05/02"); script_set_attribute(attribute:"patch_publication_date", value:"2007/07/24"); script_set_attribute(attribute:"plugin_publication_date", value:"2007/09/25"); script_set_attribute(attribute:"patch_modification_date", value:"2007/07/25"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"HP-UX Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("hpux.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX"); if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING); if (!hpux_check_ctx(ctx:"11.23")) { exit(0, "The host is not affected since PHNE_35766 applies to a different OS release."); } patches = make_list("PHNE_35766", "PHNE_37395", "PHNE_37670", "PHNE_37897", "PHNE_38679", "PHNE_39387", "PHNE_41436", "PHNE_42094", "PHNE_43215"); foreach patch (patches) { if (hpux_installed(app:patch)) { exit(0, "The host is not affected because patch "+patch+" is installed."); } } flag = 0; if (hpux_check_patch(app:"Networking.NET-PRG", version:"B.11.23")) flag++; if (hpux_check_patch(app:"Networking.NET-RUN", version:"B.11.23")) flag++; if (hpux_check_patch(app:"Networking.NET-RUN-64", version:"B.11.23")) flag++; if (hpux_check_patch(app:"Networking.NET2-KRN", version:"B.11.23")) flag++; if (hpux_check_patch(app:"Networking.NET2-RUN", version:"B.11.23")) flag++; if (hpux_check_patch(app:"Networking.NMS2-KRN", version:"B.11.23")) flag++; if (hpux_check_patch(app:"Networking.NW-ENG-A-MAN", version:"B.11.23")) flag++; if (hpux_check_patch(app:"OS-Core.CORE2-KRN", version:"B.11.23")) flag++; if (hpux_check_patch(app:"OS-Core.SYS2-ADMIN", version:"B.11.23")) flag++; if (hpux_check_patch(app:"ProgSupport.C-INC", version:"B.11.23")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:hpux_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_35351.NASL description s700_800 11.11 cumulative ARPA Transport patch : The remote HP-UX host is affected by multiple vulnerabilities : - A potential security vulnerability has been identified with HP-UX running TCP/IP (IPv4). This vulnerability could be remotely exploited to cause a Denial of Service (DoS). (HPSBUX01137 SSRT5954) - A potential security vulnerability has been identified with HP-UX running ARPA Transport. The vulnerability could be exploited remotely to create a Denial of Service (DoS). (HPSBUX02248 SSRT071437) - A potential security vulnerability has been identified with HP-UX running ARPA Transport. The vulnerability could be exploited locally by an authorized user to create a Denial of Service (DoS). (HPSBUX02247 SSRT071432) last seen 2020-06-01 modified 2020-06-02 plugin id 26131 published 2007-09-25 reporter This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/26131 title HP-UX PHNE_35351 : s700_800 11.11 cumulative ARPA Transport patch NASL family HP-UX Local Security Checks NASL id HPUX_PHNE_35352.NASL description s700_800 11.31 cumulative ARPA Transport patch : A potential security vulnerability has been identified with HP-UX running ARPA Transport. The vulnerability could be exploited remotely to create a Denial of Service (DoS). last seen 2020-06-01 modified 2020-06-02 plugin id 26132 published 2007-09-25 reporter This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/26132 title HP-UX PHNE_35352 : HP-UX Running ARPA Transport, Remote Denial of Service (DoS) (HPSBUX02248 SSRT071437 rev.1)
Oval
accepted | 2015-04-20T04:02:25.090-04:00 | ||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||
contributors |
| ||||||||||||||||||||
description | Unspecified vulnerability in the Address and Routing Parameter Area (ARPA) transport functionality in HP-UX B.11.11, B.11.23, and B.11.31 allows remote attackers to cause an unspecified denial of service via unknown vectors. | ||||||||||||||||||||
family | unix | ||||||||||||||||||||
id | oval:org.mitre.oval:def:5243 | ||||||||||||||||||||
status | accepted | ||||||||||||||||||||
submitted | 2008-07-08T17:01:37.000-04:00 | ||||||||||||||||||||
title | HP-UX Running ARPA Transport, Remote Denial of Service (DoS) | ||||||||||||||||||||
version | 47 |
References
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01087206
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01087206
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01087206
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01087206
- http://secunia.com/advisories/26279
- http://secunia.com/advisories/26279
- http://www.securityfocus.com/bid/25147
- http://www.securityfocus.com/bid/25147
- http://www.securitytracker.com/id?1018482
- http://www.securitytracker.com/id?1018482
- http://www.vupen.com/english/advisories/2007/2728
- http://www.vupen.com/english/advisories/2007/2728
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35702
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35702
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5243
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5243