A vulnerability has been reported in HP-UX, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a design error in the Single Logical Screen daemon (SLSd) and can be exploited to create or overwrite arbitrary files with superuser privileges via a specially crafted packet sent to the daemon.
Successful exploitation allows execution of arbitrary code by e.g. overwriting .rhosts, cron scripts, or other files used for authentication.
The vulnerability is reported in versions 11.11i and 10.20. Other versions may also be affected.
Solution: The vendor recommends disabling SLSd (please see vendor's advisory for details).
Provided and/or discovered by: Discovered by an anonymous person and reported via iDefense Labs.
Original Advisory: HPSBUX02191 SSRT071302:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: HP-UX Single Logical Screen Daemon Arbitrary File Access
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.