{"vuid":"VU#229867","idnumber":"229867","name":"HP Tru64 UNIX \"su\" command vulnerable to buffer overflow","keywords":["Hewlett Packard","Compaq","Tru64","su command","buffer overflow","SSRT2257"],"overview":"The Hewlett Packard Tru64 \"su\" command contains a locally exploitable buffer overflow. An exploit for this vulnerability is known to exist and may be circulating.","clean_desc":"The Hewlett Packard Tru64 operating system contains a command, known as \"su,\" that allows users to assume the privileges of another user. This program is vulnerable to a buffer overflow.","impact":"This vulnerability can be exploited by local non-root users on a machine to cause a denial-of-service condition, or assume the privileges of the root user.","resolution":"Hewlett Packard has issued a patch that corrects this vulnerability. More information can be found here.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Ian A Finlay.","public":["http://www.securityfocus.com/bid/5272","http://ftp.support.compaq.com/patches/public/Readmes/unix/duv40fb18-c0067403-14947-es-20020730.README"],"cveids":["CVE-2002-0816"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-07-23T16:45:03Z","publicdate":"2002-07-19T00:00:00Z","datefirstpublished":"2003-03-21T15:30:37Z","dateupdated":"2003-04-15T13:57:27Z","revision":14,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"20","cam_attackeraccessrequired":"10","cam_scorecurrent":"18.75","cam_scorecurrentwidelyknown":"18.75","cam_scorecurrentwidelyknownexploited":"33.75","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":18.75,"vulnote":null}