7.6 High
AI Score
Confidence
High
4.6 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
25.9%
Buffer overflow in dtmail on HP Tru64 UNIX 4.0F through 5.1B and HP-UX B.11.00 through B.11.23 allows local users to execute arbitrary code via a long -a (aka attachment) argument.
h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00793091
secunia.com/advisories/22451
secunia.com/advisories/22528
securitytracker.com/id?1017083
securitytracker.com/id?1017098
securitytracker.com/id?1017099
www.netragard.com/pdfs/research/HP-TRU64-DTMAIL-20060810.txt
www.securityfocus.com/archive/1/449321/100/0/threaded
www.securityfocus.com/bid/20580
www.vupen.com/english/advisories/2006/4139
www.vupen.com/english/advisories/2006/4140
exchange.xforce.ibmcloud.com/vulnerabilities/29644
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5175