HP has reported multiple local and remote buffer overflow vulnerabilities Tru64 UNIX. The conditions are reported to exist in Tru64 UNIX running IPsec and SSH software. Immediate consequences of an attack may result in a denial of service. An attacker may leverage the issues by exploiting an unbounded memory copy operation to overwrite the saved return address/base pointer, causing an affected procedure to return to an address of their choice. Successful exploitation of this issue may allow an attacker to execute arbitrary code in the context of the vulnerable software in order to gain unauthorized access, however, this has not been confirmed at the moment. HP Tru64 UNIX versions 5.1B PK2 (BL22), PK3 (BL24) and V5.1A running IPsec and SSH software kits prior to IPsec 2.1.1 and SSH 3.2.2 have been reported to be prone to these issues. This vulnerability record will be divided into multiple Bugtraq IDs when analysis of the individual issues is complete. Some of these issues may...
HP has reported multiple local and remote buffer overflow vulnerabilities Tru64 UNIX. The conditions are reported to exist in Tru64 UNIX running IPsec and SSH software. Immediate consequences of an attack may result in a denial of service. An attacker may leverage the issues by exploiting an unbounded memory copy operation to overwrite the saved return address/base pointer, causing an affected procedure to return to an address of their choice. Successful exploitation of this issue may allow an attacker to execute arbitrary code in the context of the vulnerable software in order to gain unauthorized access, however, this has not been confirmed at the moment. HP Tru64 UNIX versions 5.1B PK2 (BL22), PK3 (BL24) and V5.1A running IPsec and SSH software kits prior to IPsec 2.1.1 and SSH 3.2.2 have been reported to be prone to these issues. This vulnerability record will be divided into multiple Bugtraq IDs when analysis of the individual issues is complete. Some of these issues may already be known. Where it is appropriate, existing Bugtraq IDs will also be updated to reflect the information in the advisory. Although unconfirmed, it is likely that these issues are related to OpenSSL SSLv2 Client_Master_Key Remote Denial Of Service Vulnerability (BID 8746), OpenSSL ASN.1 Parsing Vulnerabilities (BID 8732), and OpenSSL ASN.1 Large Recursion Remote Denial Of Service Vulnerability (BID 8970).