{"vuid":"VU#177067","idnumber":"177067","name":"HP Tru64 UNIX \"passwd\" contains buffer overflow (SSRT2192)","keywords":["Hewlett Packard","Compaq","Tru64","passwd command","buffer overflow","SSRT2192"],"overview":"The HP Tru64 UNIX implementation of \"passwd\" contains a locally exploitable buffer overflow.","clean_desc":"\"passwd\" is a utility used to change the password for the current user. A locally exploitable buffer overflow in \"passwd\" may permit a local attacker to gain elevated privileges and execute arbitrary code on a vulnerable host.","impact":"A local user may be able to gain elevated privileges and execute arbitrary code.","resolution":"Apply a patch.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by SNOsoft.","author":"This document was written by Ian A Finlay.","public":["http://www.securityfocus.com/bid/5380","http://ftp.support.compaq.com/patches/public/Readmes/unix/duv40fb18-c0067403-14947-es-20020730.README","http://ftp.support.compaq.com/patches/public/unix/v5.1a/t64v51ab3-c0043701-15279-es-20020828.README","https://www.jcu.edu.au/pipermail/auscert-subscriber/2002-August/000271.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-05-31T15:17:08Z","publicdate":"2002-08-01T00:00:00Z","datefirstpublished":"2002-09-05T18:04:33Z","dateupdated":"2002-09-05T18:05:28Z","revision":21,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"5","cam_impact":"20","cam_easeofexploitation":"20","cam_attackeraccessrequired":"10","cam_scorecurrent":"7.5","cam_scorecurrentwidelyknown":"9.375","cam_scorecurrentwidelyknownexploited":"16.875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":7.5,"vulnote":null}