---------------------------------------------------------------------- Secunia integrated with Microsoft WSUS http://secunia.com/blog/71/ ---------------------------------------------------------------------- TITLE: OpenVMS RMS Privilege Escalation Vulnerability SECUNIA ADVISORY ID: SA38366 VERIFY ADVISORY: http://secunia.com/advisories/38366/ DESCRIPTION: A vulnerability has been reported in OpenVMS, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to an unspecified error in the RMS (Record Management Services) implementation on ALPHA platforms and can be exploited to execute arbitrary code with elevated privileges. The vulnerability is reported in systems having RMS patch kit VMS83A_RMS-V1000 or update kit VMS83A_UPDATE-V1100 installed. SOLUTION: Install patch kit VMS83A_RMS-V1100: http://itrc.hp.com The vulnerability is also fixed in VMS83A_UPDATE-V1200. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: HPSBOV02505 SSRT100023: http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02001423 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------