Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Try our Premium Alert Service
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service

Category:   OS (Other)  >   OpenVMS Vendors:   HPE
OpenVMS 'SESSION_CONTROL.EXE' May Disclose a Password to Administrators via the Audit Log
SecurityTracker Alert ID:  1016772
SecurityTracker URL:
CVE Reference:   CVE-2006-4537   (Links to External Site)
Updated:  Jun 8 2008
Original Entry Date:  Aug 31 2006
Impact:   Disclosure of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.3-2
Description:   A vulnerability was reported in OpenVMS. A local administrator may be able to view a password.

When a "network breakin" event occurs and a valid, authenticated connection occurs immediately after the event, the password from the valid connection will be written to the audit logfile in clear text form.

The vulnerability resides in the 'SYS$LOADABLE_IMAGES:NET$SESSION_CONTROL.EXE' component.

The vendor reported this vulnerability.

Impact:   A local administrator may be able to view a password in the audit logfile.
Solution:   The vendor has issued a patch kit (AXP_DNVOSIECO03-V732.PCSI-DCX_AXPEXE).

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2018, LLC