Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   OS (Other)  >   OpenVMS Vendors:   HP
OpenVMS SESSION_CONTROL.EXE Bug May Disclose Passwords to Local Users in Certain Cases
SecurityTracker Alert ID:  1017472
SecurityTracker URL:
CVE Reference:   CVE-2006-4537   (Links to External Site)
Updated:  May 20 2008
Original Entry Date:  Jan 5 2007
Impact:   Disclosure of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): OpenVMS Alpha V8.2
Description:   A vulnerability was reported in OpenVMS. A local user can obtain passwords.

A flaw in 'SYS$LOADABLE_IMAGES:NET$SESSION_CONTROL.EXE' causes a user's password to be recorded in plaintext in the audit logfile when the user logs in with the correct password just after a "network breakin" event has occurred.

Impact:   A local user can obtain passwords.
Solution:   The vendor has issued a fix (AXP_DNVOSIECO02-V82), available at:

The HP advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error
Underlying OS:  

Message History:   None.

 Source Message Contents

Date:  Fri, 5 Jan 2007 09:14:05 -0500
Subject:  OpenVMS


>          ECO02:

>              - This release fixes a security problem wherein the
>              correct password appears in the audit logfile, when a
>              connection attempt is made with the right password after
>              a "network breakin" event has occurred.

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2015, LLC