Vulnerability Name:

CVE-2002-0816 (CCN-9640)

Assigned:2002-07-19
Published:2002-07-19
Updated:2016-10-18
Summary:Buffer overflow in su in Tru64 Unix 5.x allows local users to gain root privileges via a long username and argument.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Thu Jul 18 2002 - 22:02:43 CDT
tru64 proof of concept /bin/su non-exec bypass

Source: COMPAQ
Type: UNKNOWN
SSRT2257

Source: CCN
Type: Compaq SECURITY BULLETIN SRB0039W
HP Tru64 UNIX - Potential Buffer Overflows & SSRT2229 Potential Denial of Service

Source: MITRE
Type: CNA
CVE-2002-0816

Source: BUGTRAQ
Type: UNKNOWN
20020719 tru64 proof of concept /bin/su non-exec bypass

Source: XF
Type: UNKNOWN
tru64-su-bo(9640)

Source: CCN
Type: US-CERT VU#229867
HP Tru64 UNIX su command vulnerable to buffer overflow

Source: CERT-VN
Type: US Government Resource
VU#229867

Source: CCN
Type: OSVDB ID: 5076
HP Tru64 UNIX su Local Overflow

Source: BID
Type: UNKNOWN
5272

Source: CCN
Type: BID-5272
Tru64 SU Command Line Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
tru64-su-bo(9640)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:compaq:tru64:4.0f:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0g:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.0a:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.1a:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:compaq:tru64:4.0f:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0g:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.0a:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.1a:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    compaq tru64 4.0f
    compaq tru64 4.0g
    compaq tru64 5.0
    compaq tru64 5.0a
    compaq tru64 5.1
    compaq tru64 5.1a
    compaq tru64 4.0f
    compaq tru64 4.0g
    compaq tru64 5.0a
    compaq tru64 5.1
    compaq tru64 5.1a