Vulnerability Name:

CVE-2006-5452 (CCN-29644)

Assigned:2006-10-18
Published:2006-10-18
Updated:2018-10-17
Summary:Buffer overflow in dtmail on HP Tru64 UNIX 4.0F through 5.1B and HP-UX B.11.00 through B.11.23 allows local users to execute arbitrary code via a long -a (aka attachment) argument.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
3.4 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
5.3 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2006-5452

Source: CCN
Type: HP Security Bulletin HPSBTU02163 SSRT061223
HP Tru64 UNIX Running dtmail, Local Execution of Arbitrary Code

Source: HP
Type: UNKNOWN
HPSBUX02162

Source: CCN
Type: SA22451
HP-UX dtmail Privilege Escalation Vulnerability

Source: SECUNIA
Type: UNKNOWN
22451

Source: CCN
Type: SA22528
HP Tru64 Unix dtmail Privilege Escalation Vulnerability

Source: SECUNIA
Type: UNKNOWN
22528

Source: CCN
Type: SECTRACK ID: 1017083
HP Tru64 UNIX Dtmail Buffer Overflow Lets Local Users Gain Root Privileges

Source: SECTRACK
Type: UNKNOWN
1017083

Source: CCN
Type: SECTRACK ID: 1017098
(HP Issues Fix for HP-UX) HP UNIX Dtmail Buffer Overflow Lets Local Users Gain Root Privileges

Source: SECTRACK
Type: Patch
1017098

Source: CCN
Type: SECTRACK ID: 1017099
(HP Issues Fix for Tru64 UNIX) HP UNIX Dtmail Buffer Overflow Lets Local Users Gain Root Privileges

Source: SECTRACK
Type: Patch
1017099

Source: CCN
Type: ASA-2006-239
HPSBUX02162 dtmail local execution of arbitrary code

Source: CCN
Type: NETRAGARD-20060810
dtmail

Source: MISC
Type: Vendor Advisory
http://www.netragard.com/pdfs/research/HP-TRU64-DTMAIL-20060810.txt

Source: CCN
Type: OSVDB ID: 29974
HP-UX / Tru64 Unix dtmail -a Argument Local Overflow

Source: HP
Type: UNKNOWN
HPSBTU02163

Source: BID
Type: UNKNOWN
20580

Source: CCN
Type: BID-20580
HP DTMail Attachment Argument Buffer Overflow Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2006-4139

Source: VUPEN
Type: UNKNOWN
ADV-2006-4140

Source: XF
Type: UNKNOWN
dtmail-tru64-bo(29644)

Source: XF
Type: UNKNOWN
dtmail-tru64-bo(29644)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:5175

Vulnerable Configuration:Configuration 1:
  • cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.4:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*
  • OR cpe:/o:hp:tru64:4.0f:*:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:4.0f:pk8:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:4.0g:*:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:4.0g:pk4:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:5.0a:*:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:5.1a:*:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:5.1a:pk6:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:5.1af:*:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:5.1b:pk1:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:5.1b2:pk4:*:*:*:*:*:*
  • OR cpe:/o:hp:tru64:5.1b3:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:hp:dtmail:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:5175
    V
    HP-UX Running dtmail, Local Execution of Arbitrary Code
    2014-03-24
    BACK
    hp hp-ux 11.00
    hp hp-ux 11.4
    hp hp-ux 11.11
    hp hp-ux 11.22
    hp hp-ux 11.23
    hp tru64 4.0f
    hp tru64 4.0f pk8
    hp tru64 4.0g
    hp tru64 4.0g pk4
    hp tru64 5.0a
    hp tru64 5.1
    hp tru64 5.1a
    hp tru64 5.1a pk6
    hp tru64 5.1af
    hp tru64 5.1b pk1
    hp tru64 5.1b2 pk4
    hp tru64 5.1b3
    hp dtmail *