Vulnerability Name:

CCN-505

Published:1994-03-01
Updated:1994-03-01
Summary:Attackers can modify system files using a program to alter checksums to make a program appear to be legitimate. This may allow attackers to install trojan horse programs or other malicious programs without an administrator's knowledge.
CVSS v3 Severity:
CVSS v2 Severity:
Vulnerability Consequences:Other
References:Source: CCN
Type: CERT Advisory CA-1994-05
MD5 Checksums

Source: XF
Type: UNKNOWN
md5-checksums(505)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:ibm:aix:*:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:*:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:*:*:*:*:*:*:*:*
  • OR cpe:/o:sco:unix:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ibm aix *
    hp hp-ux *
    linux linux kernel *
    sun solaris *
    sco unix *