ID CVE-2001-0607
Summary asecure as included with HP-UX 10.01 through 11.00 can allow a local attacker to create a denial of service and gain additional privileges via unsafe permissions on the asecure program, a different vulnerability than CVE-2000-0083.
References
Vulnerable Configurations
  • cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:7.00:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:7.00:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:7.02:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:7.02:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:7.04:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:7.04:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:7.06:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:7.06:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:7.08:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:7.08:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:8:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:8:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:8.00:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:8.00:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:8.01:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:8.01:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:8.02:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:8.02:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:8.04:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:8.04:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:8.06:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:8.06:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:8.07:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:8.07:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:8.08:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:8.08:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:8.09:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:8.09:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:9.06:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:9.06:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:9.08:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:9.08:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:9.09:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:9.09:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:9.10:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:9.10:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.02:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.02:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.03:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.03:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.26:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.26:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*
  • cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
    cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 11-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:P
oval via4
accepted 2008-08-25T04:00:21.529-04:00
class vulnerability
contributors
name Michael Wood
organization Hewlett-Packard
description asecure as included with HP-UX 10.01 through 11.00 can allow a local attacker to create a denial of service and gain additional privileges via unsafe permissions on the asecure program, a different vulnerability than CVE-2000-0083.
family unix
id oval:org.mitre.oval:def:5621
status accepted
submitted 2008-07-10T16:22:36.000-04:00
title Certain files used by the asecure program have unsafe permissions.
version 35
refmap via4
hp HPSBUX0103-145
Last major update 11-10-2017 - 01:29
Published 22-08-2001 - 04:00
Last modified 11-10-2017 - 01:29
Back to Top