---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: HP TCP/IP Services for OpenVMS Finger Format String Vulnerability SECUNIA ADVISORY ID: SA31587 VERIFY ADVISORY: http://secunia.com/advisories/31587/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: HP TCP/IP Services for OpenVMS 5.x http://secunia.com/product/2949/ DESCRIPTION: Christer Öberg, Claes Nyberg, and James Tusini have reported a vulnerability in HP TCP/IP Services for OpenVMS, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a format string error in the finger client and can be exploited via specially crafted ".plan" or ".project" files placed in the attacker's home directory. Successful exploitation may allow execution of arbitrary code, but requires that the user is tricked into connecting to a malicious finger server. SOLUTION: Do not run the finger client against untrusted finger servers. PROVIDED AND/OR DISCOVERED BY: Christer Öberg, Claes Nyberg, and James Tusini ORIGINAL ADVISORY: http://deathrow.vistech.net/DEFCON16/VMS.PDF ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------