SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Other)  >   OpenVMS Vendors:   HPE
OpenVMS 'SESSION_CONTROL.EXE' May Disclose a Password to Administrators via the Audit Log
SecurityTracker Alert ID:  1016772
SecurityTracker URL:  http://securitytracker.com/id/1016772
CVE Reference:   CVE-2006-4537   (Links to External Site)
Updated:  Jun 8 2008
Original Entry Date:  Aug 31 2006
Impact:   Disclosure of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.3-2
Description:   A vulnerability was reported in OpenVMS. A local administrator may be able to view a password.

When a "network breakin" event occurs and a valid, authenticated connection occurs immediately after the event, the password from the valid connection will be written to the audit logfile in clear text form.

The vulnerability resides in the 'SYS$LOADABLE_IMAGES:NET$SESSION_CONTROL.EXE' component.

The vendor reported this vulnerability.

Impact:   A local administrator may be able to view a password in the audit logfile.
Solution:   The vendor has issued a patch kit (AXP_DNVOSIECO03-V732.PCSI-DCX_AXPEXE).

The vendor's advisory is available at:

ftp://ftp.itrc.hp.com/openvms_patches/alpha/V7.3-2/AXP_DNVOSIECO03-V732.txt

Vendor URL:  www.hp.com/ (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC