Copy Link
Add to Bookmark
Report

CERT Advisory 059

eZine's profile picture
Published in 
CERT Advisory
 · 4 years ago

  


-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
CA-93:05 CERT Advisory
February 24, 1993
OpenVMS and OpenVMS AXP Vulnerability

- ---------------------------------------------------------------------------

The CERT Coordination Center has received information concerning a
potential vulnerability with Digital Equipment Corporation's OpenVMS
and OpenVMS AXP. This vulnerability is present in OpenVMS V5.0 through
V5.5-2 and OpenVMS AXP V1.0 but has been corrected in OpenVMS V6.0 and
OpenVMS AXP V1.5. The Software Security Response Team at Digital
Equipment Corporation has provided the following information
concerning this vulnerability.

For additional information, please contact your local Digital Equipment
Corporation customer service representative.


Beginning of Text Provided by Digital Equipment Corporation
==============================================================================

23.FEB.1993

SOURCE: Digital Equipment Corporation
AUTHOR: Software Security Response Team
Colorado Springs USA

PRODUCT: OpenVMS V5.0 through V5.5-2 & OpenVMS AXP V1.0

PROBLEM: Potential Security Vulnerability - OpenVMS

SOLUTION: A remedial kit is now available for
OpenVMS AXP V1.0 and OpenVMS V5.0 through
V5.5-2 (including all SEVMS versions V5.1 through
V5.5-2 as applicable) by contacting your normal
Digital Services Support organization.

SEVERITY LEVEL: High

This potential vulnerability has been corrected in the next release of
OpenVMS V6.0 and OpenVMS AXP V1.5. For VMS Versions prior to
OpenVMS V5.0, Digital strongly recommends that you upgrade to a
minimum of OpenVMS V5.0 and further, to the latest release of
OpenVMS V5.5-2.

-------------------------------------------------------------------------
The remedial kits may be identified as:

VAXSYS01_U2050 VMS V5.0, V5.0-1, V5.0-2
VAXSYS01_U1051 VMS V5.1
VAXSYS01_U1052 VMS V5.2
VAXSYS01_U2053 VMS V5.3 thru V5.3-2
VAXSYS01_U3054 VMS V5.4 thru V5.4-3
VAXSYS02_U2055 OpenVMS V5.5 thru V5.5-2
AXPSYS01_010 OpenVMS AXP V1.0

-------------------------------------------------------------------------
Copyright (c) Digital Equipment Corporation, 1993 All Rights Reserved.
Published Rights Reserved Under The Copyright Laws Of The United States.

-------------------------------------------------------------------------
ADVISORY INFORMATION:
-------------------------------------------------------------------------

This update kit corrects a potential security vulnerability in
the OpenVMS VAX and OpenVMS AXP operating systems. This potential
vulnerability may be further exploited in the form of a malicious program
that may allow authorized but unprivileged users to obtain all system
privileges, potentially giving the unprivileged user control of your
OpenVMS system and data.

NOTE:

The update kit must be applied if an update or installation is performed
for all versions prior to OpenVMS V6.0 or OpenVMS AXP V1.5. For VMS
Versions prior to OpenVMS V5.0, Digital strongly recommends that
you upgrade to a minimum of OpenVMS V5.0 and further to the
latest release of OpenVMS V5.5-2.

-------------------------------------------------------------------------
INFORMATION:
-------------------------------------------------------------------------

Digital strongly recommends that you install the available kit on your
system(s), to avoid any potential vulnerability as a result of this
problem.

Customers with a Digital Services contract may obtain a kit for the
affected versions of OpenVMS by contacting your normal support
organizations.

- In the U.S. Customers may contact the Customer Support Center
at 1(800)354-9000 and request the appropriate kit for your version
of OpenVMS, or through DSNlink Text Search database using the
keyword text "Potential Security Vulnerability", or DSNlink VTX using
the patch number 1084.

- Customers in other geographies should contact their normal Digital
Services support organizations.

As always, Digital recommends you to regularly review your system
management and security procedures. Digital will continue to review and
enhance security features, and work with our customers to further improve
the integrity of their systems.

==============================================================================
End of Text Provided by Digital Equipment Corporation

- ------------------------------------------------------------------------------
The CERT Coordination Center wishes to thank Digital Equipment
Corporation's Software Security Response Team for their response to
this problem.
- ------------------------------------------------------------------------------

If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in FIRST (Forum of Incident
Response and Security Teams).

Internet E-mail: cert@cert.org
Telephone: 412-268-7090 (24-hour hotline)
CERT personnel answer 7:30 a.m.-6:00 p.m. EST(GMT-5)/EDT(GMT-4),
on call for emergencies during other hours.

CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890

Past advisories, information about FIRST representatives, and other
information related to computer security are available for anonymous FTP
from cert.org (192.88.209.5).


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMaMxJnVP+x0t4w7BAQGF3QQAgLGVA1C3e56LPzyhBtK/sDn8bJ5GAUkf
l/LSoukmSsFeMw741WGIcrJIVgQjyyek+br5/Jgr7NCGijKpyPG7W0j9jE5oq21z
FbHEy/0yi6Tk5rlrfTZ2iXvTh7rLh4hmubqHeiUYJ82ZyHryfjJBEqpWqW+MAcdR
9O+J3WrWxuE=
=ZXM+
-----END PGP SIGNATURE-----

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT