fkie_cve-2010-1039
Vulnerability from fkie_nvd
Published
2010-05-20 17:30
Modified
2025-04-11 00:51
Severity ?
Summary
Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and earlier; IBM VIOS 2.1, 1.5, and earlier; NFS/ONCplus B.11.31_09 and earlier on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote attackers to execute arbitrary code via an RPC request containing format string specifiers in an invalid directory name.
References
hp-security-alert@hp.comhttp://aix.software.ibm.com/aix/efixes/security/pcnfsd_advisory.asc
hp-security-alert@hp.comhttp://marc.info/?l=bugtraq&m=127428077629933&w=2Vendor Advisory
hp-security-alert@hp.comhttp://marc.info/?l=bugtraq&m=127428077629933&w=2Vendor Advisory
hp-security-alert@hp.comhttp://osvdb.org/64729
hp-security-alert@hp.comhttp://secunia.com/advisories/39835Vendor Advisory
hp-security-alert@hp.comhttp://secunia.com/advisories/39911
hp-security-alert@hp.comhttp://securitytracker.com/id?1024016
hp-security-alert@hp.comhttp://www.checkpoint.com/defense/advisories/public/2010/cpai-13-May.html
hp-security-alert@hp.comhttp://www.ibm.com/support/docview.wss?uid=isg1IZ73590
hp-security-alert@hp.comhttp://www.ibm.com/support/docview.wss?uid=isg1IZ73599
hp-security-alert@hp.comhttp://www.ibm.com/support/docview.wss?uid=isg1IZ73681
hp-security-alert@hp.comhttp://www.ibm.com/support/docview.wss?uid=isg1IZ73757
hp-security-alert@hp.comhttp://www.ibm.com/support/docview.wss?uid=isg1IZ73874
hp-security-alert@hp.comhttp://www.ibm.com/support/docview.wss?uid=isg1IZ75369
hp-security-alert@hp.comhttp://www.ibm.com/support/docview.wss?uid=isg1IZ75440
hp-security-alert@hp.comhttp://www.ibm.com/support/docview.wss?uid=isg1IZ75465
hp-security-alert@hp.comhttp://www.securityfocus.com/archive/1/511405/100/0/threaded
hp-security-alert@hp.comhttp://www.securityfocus.com/bid/40248Patch
hp-security-alert@hp.comhttp://www.securitytracker.com/id?1023994
hp-security-alert@hp.comhttp://www.vupen.com/english/advisories/2010/1199Vendor Advisory
hp-security-alert@hp.comhttp://www.vupen.com/english/advisories/2010/1211Vendor Advisory
hp-security-alert@hp.comhttp://www.vupen.com/english/advisories/2010/1212Vendor Advisory
hp-security-alert@hp.comhttp://www.vupen.com/english/advisories/2010/1213Vendor Advisory
hp-security-alert@hp.comhttp://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=5088
hp-security-alert@hp.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/58718
hp-security-alert@hp.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11986
hp-security-alert@hp.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12103
af854a3a-2127-422b-91ae-364da2661108http://aix.software.ibm.com/aix/efixes/security/pcnfsd_advisory.asc
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=127428077629933&w=2Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=127428077629933&w=2Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/64729
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39835Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39911
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1024016
af854a3a-2127-422b-91ae-364da2661108http://www.checkpoint.com/defense/advisories/public/2010/cpai-13-May.html
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IZ73590
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IZ73599
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IZ73681
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IZ73757
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IZ73874
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IZ75369
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IZ75440
af854a3a-2127-422b-91ae-364da2661108http://www.ibm.com/support/docview.wss?uid=isg1IZ75465
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/511405/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/40248Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1023994
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1199Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1211Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1212Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1213Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=5088
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/58718
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11986
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12103
Impacted products
Vendor Product Version
hp nfs\/oncplus *
hp hp-ux b.11.11
hp hp-ux b.11.23
hp hp-ux b.11.31
ibm aix *
ibm aix 1.2.1
ibm aix 1.3
ibm aix 2.2.1
ibm aix 3.1
ibm aix 3.2
ibm aix 3.2.0
ibm aix 3.2.4
ibm aix 3.2.5
ibm aix 4
ibm aix 4.0
ibm aix 4.1
ibm aix 4.1.1
ibm aix 4.1.2
ibm aix 4.1.3
ibm aix 4.1.4
ibm aix 4.1.5
ibm aix 4.2
ibm aix 4.2.0
ibm aix 4.2.1
ibm aix 4.2.1.12
ibm aix 4.3
ibm aix 4.3.0
ibm aix 4.3.1
ibm aix 4.3.2
ibm aix 4.3.3
ibm aix 5.1
ibm aix 5.1.0.10
ibm aix 5.1l
ibm aix 5.2
ibm aix 5.2.0
ibm aix 5.2.0.50
ibm aix 5.2.0.54
ibm aix 5.2.2
ibm aix 5.2_l
ibm aix 6.1
ibm aix 430
ibm vios *
ibm vios 1.4
ibm vios 2.1
sgi irix 6.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:nfs\\/oncplus:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26F6C626-C81C-4E55-B26D-F6ECBF39D3DB",
              "versionEndIncluding": "b.11.31_09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "972D4ABF-2E80-4902-910D-5BD0CBEC9765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "12C73959-3E02-4847-8962-651D652800EE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64BBA96-FB3C-46AC-9A29-50EE02714FE9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53FB5008-7D53-447F-857B-B56A1DA020EB",
              "versionEndIncluding": "5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73CE931A-1500-4450-B65A-591CAA3225AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F40A32B-3EF8-41D4-B6EC-3DC82D550365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B1C99E-D05A-4778-8650-39B63CC8B2F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE321D29-3312-4F22-B930-1B119DA4BD27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5E0678-45C7-492A-963C-897494D6878F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "52E2640B-D116-4CB1-A2B8-648AE716D40A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55C28A7-CD21-47CD-AA50-E8B2D89A18E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C00FC9-AD97-4226-A0EA-7DB14AA592DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BAE3D61-9D78-46D7-87EB-5A33ECF86F83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44C6203A-D05B-47B1-8BC2-BA021EBAFDEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BA7775-30F2-4CA0-BA6E-70ED12A48D90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB038A89-1CA6-4313-B7CE-56C894945FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3BC86F-5718-4232-BFFF-6244A7C09B8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6118CC1-6E51-4E1B-8F58-43B337515222",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D3B348-270F-4209-B31A-2B40F5E4A601",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD507AC-A6D2-48AA-B6BB-9220AD85DC00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D7C561-4D23-430B-A7D8-137E52B08FF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.2.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFC11AE2-424A-4312-8805-BF886AFE8E1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "11ACD012-F05F-45CD-A170-96CBAA42FFE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "92B77367-8BF2-4E68-A7F1-D0780E102CCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55919E74-09E7-44BA-9941-D1B69BB1692F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "45F3C5D8-8BC3-44EB-917A-D0BA051D3D9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "465B06C4-136D-4CD8-BA38-B6B50511624C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCB23261-D5A9-4C49-B08E-97A63ED6F84A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:5.1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "54254625-FC83-4617-8161-CA1FB3092753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:5.1l:*:*:*:*:*:*:*",
              "matchCriteriaId": "43E38D56-80BA-460C-A296-ED7F506E4364",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "17EECCCB-D7D1-439A-9985-8FAE8B44487B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:5.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8A7DBFF-B11B-47EC-9E52-C12B156739D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:5.2.0.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B380F93D-5B13-49D0-B130-D45C2849A135",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:5.2.0.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C8004D-639C-47BC-BE3E-CF5F06C1679C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:5.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD01F19-4B30-4147-AC48-7F5C64EE80CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:5.2_l:*:*:*:*:*:*:*",
              "matchCriteriaId": "104E5C14-6D87-494B-8D60-0443ADDCD31A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD518B94-9CD7-4C45-8766-578CF427B4CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:ibm:aix:430:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2A70A22-0453-4885-9FCB-F197EC844265",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:vios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C74A3AA-E547-4C2D-B9E1-3A516F364BBF",
              "versionEndIncluding": "1.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2AB87CE-4A33-4C35-8A5B-FC2696712550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:vios:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A37C3C90-ED84-437F-AE68-57D09BF6999A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and earlier; IBM VIOS 2.1, 1.5, and earlier; NFS/ONCplus B.11.31_09 and earlier on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote attackers to execute arbitrary code via an RPC request containing format string specifiers in an invalid directory name."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de cadena de formato en la funci\u00f3n _msgout en rpc.pcnfsd en AIX de IBM versiones 6.1, 5.3 y anteriores; VIOS de IBM versiones 2.1, 1.5 y anteriores; NFS/ONCplus versi\u00f3n B.11.31_09 y anteriores sobre HP-UX de HP versiones B.11.11, B.11.23 y B.11.31; y IRIX de SGI  versi\u00f3n 6.5, permiten a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de una petici\u00f3n RPC que contiene especificadores de cadena de formato en un nombre de directorio no comprobado."
    }
  ],
  "id": "CVE-2010-1039",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-05-20T17:30:01.350",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://aix.software.ibm.com/aix/efixes/security/pcnfsd_advisory.asc"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=127428077629933\u0026w=2"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=127428077629933\u0026w=2"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://osvdb.org/64729"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39835"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://secunia.com/advisories/39911"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://securitytracker.com/id?1024016"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.checkpoint.com/defense/advisories/public/2010/cpai-13-May.html"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ73590"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ73599"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ73681"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ73757"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ73874"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ75369"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ75440"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ75465"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.securityfocus.com/archive/1/511405/100/0/threaded"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/40248"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www.securitytracker.com/id?1023994"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1199"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1211"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1212"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1213"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=5088"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58718"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11986"
    },
    {
      "source": "hp-security-alert@hp.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12103"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://aix.software.ibm.com/aix/efixes/security/pcnfsd_advisory.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=127428077629933\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=127428077629933\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/64729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39835"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39911"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1024016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.checkpoint.com/defense/advisories/public/2010/cpai-13-May.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ73590"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ73599"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ73681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ73757"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ73874"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ75369"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ75440"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ibm.com/support/docview.wss?uid=isg1IZ75465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/511405/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/40248"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1023994"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1199"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1211"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1212"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1213"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=5088"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58718"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11986"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12103"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…