A potential security vulnerability has been identified with HP-UX. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and patch checks in this plugin were
# extracted from HP patch PHKL_34193. The text itself is
# copyright (C) Hewlett-Packard Development Company, L.P.
#
include("compat.inc");
if (description)
{
script_id(21761);
script_version("1.14");
script_cvs_date("Date: 2018/11/19 11:02:42");
script_cve_id("CVE-2006-3201");
script_xref(name:"HP", value:"emr_na-c00705283");
script_xref(name:"HP", value:"HPSBUX02127");
script_xref(name:"HP", value:"SSRT051056");
script_name(english:"HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)");
script_summary(english:"Checks for the patch in the swlist output");
script_set_attribute(
attribute:"synopsis",
value:"The remote HP-UX host is missing a security-related patch."
);
script_set_attribute(
attribute:"description",
value:
"s700_800 11.11 POSIX IPC calls audit, Message Queue update :
A potential security vulnerability has been identified with HP-UX. The
vulnerability could be exploited by a local user to create a Denial of
Service (DoS)."
);
# http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705283
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?219154e0"
);
script_set_attribute(
attribute:"solution",
value:"Install patch PHKL_34193 or subsequent."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:hp:hp-ux");
script_set_attribute(attribute:"patch_publication_date", value:"2006/06/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2006/06/27");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"HP-UX Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/HP-UX/version", "Host/HP-UX/swlist");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("hpux.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/HP-UX/version")) audit(AUDIT_OS_NOT, "HP-UX");
if (!get_kb_item("Host/HP-UX/swlist")) audit(AUDIT_PACKAGE_LIST_MISSING);
if (!hpux_check_ctx(ctx:"11.11"))
{
exit(0, "The host is not affected since PHKL_34193 applies to a different OS release.");
}
patches = make_list("PHKL_34193");
foreach patch (patches)
{
if (hpux_installed(app:patch))
{
exit(0, "The host is not affected because patch "+patch+" is installed.");
}
}
flag = 0;
if (hpux_check_patch(app:"OS-Core.CORE2-KRN", version:"B.11.11")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "HPUX_PHKL_34193.NASL", "bulletinFamily": "scanner", "title": "HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)", "description": "s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).", "published": "2006-06-27T00:00:00", "modified": "2018-11-19T00:00:00", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=21761", "reporter": "Tenable", "references": ["http://www.nessus.org/u?219154e0"], "cvelist": ["CVE-2006-3201"], "type": "nessus", "lastseen": "2019-02-21T01:09:12", "history": [{"lastseen": "2019-01-16T20:06:39", "edition": 7, "differentElements": ["description"], "bulletin": {"lastseen": "2019-01-16T20:06:39", "references": ["http://www.nessus.org/u?219154e0"], "pluginID": "21761", "description": "s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The\nvulnerability could be exploited by a local user to create a Denial of\nService (DoS).", "edition": 7, "reporter": "Tenable", "history": [], "published": "2006-06-27T00:00:00", "enchantments": {"score": {"vector": "NONE", "value": 2.1}, "dependencies": {"references": [{"idList": ["CVE-2006-3201"], "type": "cve"}, {"idList": ["HPUX_PHKL_34194.NASL", "HPUX_PHKL_34192.NASL"], "type": "nessus"}, {"idList": ["OSVDB:26873"], "type": "osvdb"}], "modified": "2019-01-16T20:06:39"}}, "title": "HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)", "type": "nessus", "objectVersion": "1.3", "naslFamily": "HP-UX Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3201"], "cpe": ["cpe:/o:hp:hp-ux"], "modified": "2018-11-19T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=21761", "id": "HPUX_PHKL_34193.NASL", "viewCount": 1, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHKL_34193. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21761);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2018/11/19 11:02:42\");\n\n script_cve_id(\"CVE-2006-3201\");\n script_xref(name:\"HP\", value:\"emr_na-c00705283\");\n script_xref(name:\"HP\", value:\"HPSBUX02127\");\n script_xref(name:\"HP\", value:\"SSRT051056\");\n\n script_name(english:\"HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The\nvulnerability could be exploited by a local user to create a Denial of\nService (DoS).\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705283\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?219154e0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHKL_34193 or subsequent.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.11\"))\n{\n exit(0, \"The host is not affected since PHKL_34193 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHKL_34193\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OS-Core.CORE2-KRN\", version:\"B.11.11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "hashmap": [{"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "75acff42350108f057c8aa83b657d0ee", "key": "cvss"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "dc14435513ab7bbbf7bd32d116ec8766", "key": "href"}, {"hash": "9fedd8d2059f748ac2844efb562cb32d", "key": "title"}, {"hash": "92b4f19a0754e03c425c29292262d873", "key": "pluginID"}, {"hash": "25bc76f9e7046d5dec1e90303da600bb", "key": "description"}, {"hash": "5e9c28fb71a885719f4f0312b51c7b38", "key": "modified"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "1ba4b1f52bb75087047f1c9905e5ef2d", "key": "references"}, {"hash": "f16a3e9bc217c38b3e5ee0e363778011", "key": "sourceData"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "7580a5d0a1aafbc13e825e89e7a456bb", "key": "cvelist"}, {"hash": "1fc6b16b34b68089b0fb1021275ff073", "key": "published"}], "hash": "afcf485465daaa445974b7d59cc8fd9eb5629cb48072aca09273d9f8064eb0e6"}}, {"lastseen": "2018-11-20T03:46:34", "edition": 6, "differentElements": ["description"], "bulletin": {"lastseen": "2018-11-20T03:46:34", "references": ["http://www.nessus.org/u?219154e0"], "pluginID": "21761", "description": "s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).", "edition": 6, "reporter": "Tenable", "history": [], "published": "2006-06-27T00:00:00", "enchantments": {"score": {"vector": "NONE", "value": 2.1}}, "title": "HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)", "type": "nessus", "objectVersion": "1.3", "naslFamily": "HP-UX Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3201"], "cpe": ["cpe:/o:hp:hp-ux"], "modified": "2018-11-19T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=21761", "id": "HPUX_PHKL_34193.NASL", "viewCount": 1, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHKL_34193. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21761);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2018/11/19 11:02:42\");\n\n script_cve_id(\"CVE-2006-3201\");\n script_xref(name:\"HP\", value:\"emr_na-c00705283\");\n script_xref(name:\"HP\", value:\"HPSBUX02127\");\n script_xref(name:\"HP\", value:\"SSRT051056\");\n\n script_name(english:\"HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The\nvulnerability could be exploited by a local user to create a Denial of\nService (DoS).\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705283\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?219154e0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHKL_34193 or subsequent.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.11\"))\n{\n exit(0, \"The host is not affected since PHKL_34193 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHKL_34193\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OS-Core.CORE2-KRN\", version:\"B.11.11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "hashmap": [{"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "75acff42350108f057c8aa83b657d0ee", "key": "cvss"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "dc14435513ab7bbbf7bd32d116ec8766", "key": "href"}, {"hash": "9fedd8d2059f748ac2844efb562cb32d", "key": "title"}, {"hash": "92b4f19a0754e03c425c29292262d873", "key": "pluginID"}, {"hash": "5e9c28fb71a885719f4f0312b51c7b38", "key": "modified"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "1ba4b1f52bb75087047f1c9905e5ef2d", "key": "references"}, {"hash": "f16a3e9bc217c38b3e5ee0e363778011", "key": "sourceData"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "a8654d5560d5747f488dadd5065946c6", "key": "description"}, {"hash": "7580a5d0a1aafbc13e825e89e7a456bb", "key": "cvelist"}, {"hash": "1fc6b16b34b68089b0fb1021275ff073", "key": "published"}], "hash": "d5f7b8e599a23c0bd130891e596ab43b714bd5b428a447ca6259999a54f53871"}}, {"lastseen": "2018-08-11T09:23:30", "edition": 3, "differentElements": ["cvss"], "bulletin": {"lastseen": "2018-08-11T09:23:30", "references": ["http://www.nessus.org/u?a39973d0"], "pluginID": "21761", "description": "s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).", "edition": 3, "reporter": "Tenable", "history": [], "published": "2006-06-27T00:00:00", "enchantments": {"score": {"vector": "NONE", "value": 2.1}}, "title": "HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)", "type": "nessus", "objectVersion": "1.3", "naslFamily": "HP-UX Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3201"], "cpe": ["cpe:/o:hp:hp-ux"], "modified": "2018-08-10T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=21761", "id": "HPUX_PHKL_34193.NASL", "viewCount": 1, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHKL_34193. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21761);\n script_version(\"1.13\");\n script_cvs_date(\"Date: 2018/08/10 18:07:07\");\n\n script_cve_id(\"CVE-2006-3201\");\n script_xref(name:\"HP\", value:\"emr_na-c00705283\");\n script_xref(name:\"HP\", value:\"HPSBUX02127\");\n script_xref(name:\"HP\", value:\"SSRT051056\");\n\n script_name(english:\"HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The\nvulnerability could be exploited by a local user to create a Denial of\nService (DoS).\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705283\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a39973d0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHKL_34193 or subsequent.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/06/27\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.11\"))\n{\n exit(0, \"The host is not affected since PHKL_34193 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHKL_34193\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OS-Core.CORE2-KRN\", version:\"B.11.11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "hashmap": [{"hash": "9c6fe61712654f56360b12011e3de300", "key": "modified"}, {"hash": "69a0db091b2d255d019ef205b14ba21f", "key": "sourceData"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "75acff42350108f057c8aa83b657d0ee", "key": "cvss"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "dc14435513ab7bbbf7bd32d116ec8766", "key": "href"}, {"hash": "9fedd8d2059f748ac2844efb562cb32d", "key": "title"}, {"hash": "92b4f19a0754e03c425c29292262d873", "key": "pluginID"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "dd407cf3a6d72fe47bbc2312b42bb05e", "key": "references"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "a8654d5560d5747f488dadd5065946c6", "key": "description"}, {"hash": "7580a5d0a1aafbc13e825e89e7a456bb", "key": "cvelist"}, {"hash": "1fc6b16b34b68089b0fb1021275ff073", "key": "published"}], "hash": "85d85b101ddc9069acff5b768188abd37d4be39bbdc7ce673313cefa82526e0e"}}, {"lastseen": "2016-09-26T17:25:35", "edition": 1, "differentElements": ["cpe"], "bulletin": {"lastseen": "2016-09-26T17:25:35", "references": ["http://www.nessus.org/u?a39973d0"], "pluginID": "21761", "description": "s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).", "edition": 1, "reporter": "Tenable", "history": [], "published": "2006-06-27T00:00:00", "enchantments": {}, "title": "HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)", "type": "nessus", "objectVersion": "1.2", "naslFamily": "HP-UX Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3201"], "cpe": [], "modified": "2014-03-12T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=21761", "id": "HPUX_PHKL_34193.NASL", "viewCount": 0, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHKL_34193. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21761);\n script_version(\"$Revision: 1.12 $\");\n script_cvs_date(\"$Date: 2014/03/12 15:37:24 $\");\n\n script_cve_id(\"CVE-2006-3201\");\n script_osvdb_id(26873);\n script_xref(name:\"HP\", value:\"emr_na-c00705283\");\n script_xref(name:\"HP\", value:\"HPSBUX02127\");\n script_xref(name:\"HP\", value:\"SSRT051056\");\n\n script_name(english:\"HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The\nvulnerability could be exploited by a local user to create a Denial of\nService (DoS).\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705283\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a39973d0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHKL_34193 or subsequent.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/06/27\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.11\"))\n{\n exit(0, \"The host is not affected since PHKL_34193 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHKL_34193\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OS-Core.CORE2-KRN\", version:\"B.11.11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "hashmap": [{"hash": "91b65a75efaaa6c29c7ded1593d4460f", "key": "modified"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "75acff42350108f057c8aa83b657d0ee", "key": "cvss"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "dc14435513ab7bbbf7bd32d116ec8766", "key": "href"}, {"hash": "9fedd8d2059f748ac2844efb562cb32d", "key": "title"}, {"hash": "92b4f19a0754e03c425c29292262d873", "key": "pluginID"}, {"hash": "24895fafe6e066d49cf6acfe601bf397", "key": "sourceData"}, {"hash": "dd407cf3a6d72fe47bbc2312b42bb05e", "key": "references"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "a8654d5560d5747f488dadd5065946c6", "key": "description"}, {"hash": "7580a5d0a1aafbc13e825e89e7a456bb", "key": "cvelist"}, {"hash": "1fc6b16b34b68089b0fb1021275ff073", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cpe"}], "hash": "afb785d57c139114c3b6b3b9cafad48f6f0b9ec6dd090405a27f1cb5807ef2ef"}}, {"lastseen": "2017-10-29T13:41:39", "edition": 2, "differentElements": ["modified", "sourceData"], "bulletin": {"lastseen": "2017-10-29T13:41:39", "references": ["http://www.nessus.org/u?a39973d0"], "pluginID": "21761", "description": "s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).", "edition": 2, "reporter": "Tenable", "history": [], "published": "2006-06-27T00:00:00", "enchantments": {"score": {"vector": "NONE", "value": 2.1}}, "title": "HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)", "type": "nessus", "objectVersion": "1.3", "naslFamily": "HP-UX Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3201"], "cpe": ["cpe:/o:hp:hp-ux"], "modified": "2014-03-12T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=21761", "id": "HPUX_PHKL_34193.NASL", "viewCount": 1, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHKL_34193. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21761);\n script_version(\"$Revision: 1.12 $\");\n script_cvs_date(\"$Date: 2014/03/12 15:37:24 $\");\n\n script_cve_id(\"CVE-2006-3201\");\n script_osvdb_id(26873);\n script_xref(name:\"HP\", value:\"emr_na-c00705283\");\n script_xref(name:\"HP\", value:\"HPSBUX02127\");\n script_xref(name:\"HP\", value:\"SSRT051056\");\n\n script_name(english:\"HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The\nvulnerability could be exploited by a local user to create a Denial of\nService (DoS).\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705283\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a39973d0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHKL_34193 or subsequent.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/06/27\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.11\"))\n{\n exit(0, \"The host is not affected since PHKL_34193 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHKL_34193\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OS-Core.CORE2-KRN\", version:\"B.11.11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "hashmap": [{"hash": "91b65a75efaaa6c29c7ded1593d4460f", "key": "modified"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "75acff42350108f057c8aa83b657d0ee", "key": "cvss"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "dc14435513ab7bbbf7bd32d116ec8766", "key": "href"}, {"hash": "9fedd8d2059f748ac2844efb562cb32d", "key": "title"}, {"hash": "92b4f19a0754e03c425c29292262d873", "key": "pluginID"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "24895fafe6e066d49cf6acfe601bf397", "key": "sourceData"}, {"hash": "dd407cf3a6d72fe47bbc2312b42bb05e", "key": "references"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "a8654d5560d5747f488dadd5065946c6", "key": "description"}, {"hash": "7580a5d0a1aafbc13e825e89e7a456bb", "key": "cvelist"}, {"hash": "1fc6b16b34b68089b0fb1021275ff073", "key": "published"}], "hash": "229f41e958bb38d6084ac64f7bc05c7bbd63c05b11cf146ffafe858978a6c95e"}}, {"lastseen": "2018-08-30T19:49:52", "edition": 4, "differentElements": ["cvss"], "bulletin": {"lastseen": "2018-08-30T19:49:52", "references": ["http://www.nessus.org/u?a39973d0"], "pluginID": "21761", "description": "s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).", "edition": 4, "reporter": "Tenable", "history": [], "published": "2006-06-27T00:00:00", "enchantments": {"score": {"vector": "NONE", "value": 2.1}}, "title": "HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)", "type": "nessus", "objectVersion": "1.3", "naslFamily": "HP-UX Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3201"], "cpe": ["cpe:/o:hp:hp-ux"], "modified": "2018-08-10T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=21761", "id": "HPUX_PHKL_34193.NASL", "viewCount": 1, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHKL_34193. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21761);\n script_version(\"1.13\");\n script_cvs_date(\"Date: 2018/08/10 18:07:07\");\n\n script_cve_id(\"CVE-2006-3201\");\n script_xref(name:\"HP\", value:\"emr_na-c00705283\");\n script_xref(name:\"HP\", value:\"HPSBUX02127\");\n script_xref(name:\"HP\", value:\"SSRT051056\");\n\n script_name(english:\"HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The\nvulnerability could be exploited by a local user to create a Denial of\nService (DoS).\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705283\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a39973d0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHKL_34193 or subsequent.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/06/27\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.11\"))\n{\n exit(0, \"The host is not affected since PHKL_34193 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHKL_34193\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OS-Core.CORE2-KRN\", version:\"B.11.11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}, "hashmap": [{"hash": "9c6fe61712654f56360b12011e3de300", "key": "modified"}, {"hash": "69a0db091b2d255d019ef205b14ba21f", "key": "sourceData"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "dc14435513ab7bbbf7bd32d116ec8766", "key": "href"}, {"hash": "9fedd8d2059f748ac2844efb562cb32d", "key": "title"}, {"hash": "92b4f19a0754e03c425c29292262d873", "key": "pluginID"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "dd407cf3a6d72fe47bbc2312b42bb05e", "key": "references"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "a8654d5560d5747f488dadd5065946c6", "key": "description"}, {"hash": "7580a5d0a1aafbc13e825e89e7a456bb", "key": "cvelist"}, {"hash": "1fc6b16b34b68089b0fb1021275ff073", "key": "published"}], "hash": "c5e9e27ad84c8d0b650bec58315d5a255caa34926396e9da93265611b1a0a630"}}, {"lastseen": "2018-09-01T23:57:16", "edition": 5, "differentElements": ["references", "modified", "sourceData"], "bulletin": {"lastseen": "2018-09-01T23:57:16", "references": ["http://www.nessus.org/u?a39973d0"], "pluginID": "21761", "description": "s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).", "edition": 5, "reporter": "Tenable", "history": [], "published": "2006-06-27T00:00:00", "enchantments": {"score": {"vector": "NONE", "value": 2.1}}, "title": "HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)", "type": "nessus", "objectVersion": "1.3", "naslFamily": "HP-UX Local Security Checks", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-3201"], "cpe": ["cpe:/o:hp:hp-ux"], "modified": "2018-08-10T00:00:00", "href": "https://www.tenable.com/plugins/index.php?view=single&id=21761", "id": "HPUX_PHKL_34193.NASL", "viewCount": 1, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHKL_34193. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21761);\n script_version(\"1.13\");\n script_cvs_date(\"Date: 2018/08/10 18:07:07\");\n\n script_cve_id(\"CVE-2006-3201\");\n script_xref(name:\"HP\", value:\"emr_na-c00705283\");\n script_xref(name:\"HP\", value:\"HPSBUX02127\");\n script_xref(name:\"HP\", value:\"SSRT051056\");\n\n script_name(english:\"HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The\nvulnerability could be exploited by a local user to create a Denial of\nService (DoS).\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705283\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a39973d0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHKL_34193 or subsequent.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/06/27\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.11\"))\n{\n exit(0, \"The host is not affected since PHKL_34193 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHKL_34193\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OS-Core.CORE2-KRN\", version:\"B.11.11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "hashmap": [{"hash": "9c6fe61712654f56360b12011e3de300", "key": "modified"}, {"hash": "69a0db091b2d255d019ef205b14ba21f", "key": "sourceData"}, {"hash": "f537a8c4c2a2ecce05af223984a006fc", "key": "naslFamily"}, {"hash": "75acff42350108f057c8aa83b657d0ee", "key": "cvss"}, {"hash": "9cf00d658b687f030ebe173a0528c567", "key": "reporter"}, {"hash": "dc14435513ab7bbbf7bd32d116ec8766", "key": "href"}, {"hash": "9fedd8d2059f748ac2844efb562cb32d", "key": "title"}, {"hash": "92b4f19a0754e03c425c29292262d873", "key": "pluginID"}, {"hash": "afe57d0304e958202be29619fb28e901", "key": "cpe"}, {"hash": "dd407cf3a6d72fe47bbc2312b42bb05e", "key": "references"}, {"hash": "bbdaea376f500d25f6b0c1050311dd07", "key": "bulletinFamily"}, {"hash": "5e0bd03bec244039678f2b955a2595aa", "key": "type"}, {"hash": "a8654d5560d5747f488dadd5065946c6", "key": "description"}, {"hash": "7580a5d0a1aafbc13e825e89e7a456bb", "key": "cvelist"}, {"hash": "1fc6b16b34b68089b0fb1021275ff073", "key": "published"}], "hash": "85d85b101ddc9069acff5b768188abd37d4be39bbdc7ce673313cefa82526e0e"}}], "edition": 8, "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cpe", "hash": "afe57d0304e958202be29619fb28e901"}, {"key": "cvelist", "hash": "7580a5d0a1aafbc13e825e89e7a456bb"}, {"key": "cvss", "hash": "75acff42350108f057c8aa83b657d0ee"}, {"key": "description", "hash": "a8654d5560d5747f488dadd5065946c6"}, {"key": "href", "hash": "dc14435513ab7bbbf7bd32d116ec8766"}, {"key": "modified", "hash": "5e9c28fb71a885719f4f0312b51c7b38"}, {"key": "naslFamily", "hash": "f537a8c4c2a2ecce05af223984a006fc"}, {"key": "pluginID", "hash": "92b4f19a0754e03c425c29292262d873"}, {"key": "published", "hash": "1fc6b16b34b68089b0fb1021275ff073"}, {"key": "references", "hash": "1ba4b1f52bb75087047f1c9905e5ef2d"}, {"key": "reporter", "hash": "9cf00d658b687f030ebe173a0528c567"}, {"key": "sourceData", "hash": "f16a3e9bc217c38b3e5ee0e363778011"}, {"key": "title", "hash": "9fedd8d2059f748ac2844efb562cb32d"}, {"key": "type", "hash": "5e0bd03bec244039678f2b955a2595aa"}], "hash": "d5f7b8e599a23c0bd130891e596ab43b714bd5b428a447ca6259999a54f53871", "viewCount": 1, "enchantments": {"score": {"value": 2.1, "vector": "NONE"}, "dependencies": {"references": [{"idList": ["CVE-2006-3201"], "type": "cve"}, {"idList": ["HPUX_PHKL_34194.NASL", "HPUX_PHKL_34192.NASL"], "type": "nessus"}, {"idList": ["OSVDB:26873"], "type": "osvdb"}], "modified": "2019-01-16T20:06:39"}, "vulnersScore": 2.1}, "objectVersion": "1.3", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHKL_34193. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21761);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2018/11/19 11:02:42\");\n\n script_cve_id(\"CVE-2006-3201\");\n script_xref(name:\"HP\", value:\"emr_na-c00705283\");\n script_xref(name:\"HP\", value:\"HPSBUX02127\");\n script_xref(name:\"HP\", value:\"SSRT051056\");\n\n script_name(english:\"HP-UX PHKL_34193 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.11 POSIX IPC calls audit, Message Queue update : \n\nA potential security vulnerability has been identified with HP-UX. The\nvulnerability could be exploited by a local user to create a Denial of\nService (DoS).\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705283\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?219154e0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHKL_34193 or subsequent.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.11\"))\n{\n exit(0, \"The host is not affected since PHKL_34193 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHKL_34193\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OS-Core.CORE2-KRN\", version:\"B.11.11\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "HP-UX Local Security Checks", "pluginID": "21761", "cpe": ["cpe:/o:hp:hp-ux"], "scheme": null}
{"cve": [{"lastseen": "2018-10-19T11:35:59", "bulletinFamily": "NVD", "description": "Unspecified vulnerability in the kernel in HP-UX B.11.00, B.11.11, and B.11.23 allows local users to cause an unspecified denial of service via unknown vectors.", "modified": "2018-10-18T12:46:14", "published": "2006-06-23T16:06:00", "id": "CVE-2006-3201", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3201", "title": "CVE-2006-3201", "type": "cve", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:23", "bulletinFamily": "software", "description": "## Vulnerability Description\nHP-UX Kernel contains a flaw that may allow a local denial of service. The issue is triggered when handling certain malformed requests, and will result in loss of availability for the system. No further details have been provided.\n## Solution Description\nCurrently, there are no known workarounds or upgrades to correct this issue. However, Hewlett-Packard has released a patch to address this vulnerability.\n## Short Description\nHP-UX Kernel contains a flaw that may allow a local denial of service. The issue is triggered when handling certain malformed requests, and will result in loss of availability for the system. No further details have been provided.\n## References:\n[Vendor Specific Advisory URL](http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705283)\nSecurity Tracker: 1016363\n[Secunia Advisory ID:20809](https://secuniaresearch.flexerasoftware.com/advisories/20809/)\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2006-06/0483.html\nKeyword: HPSBUX02127,SSRT051056\nISS X-Force ID: 27358\nFrSIRT Advisory: ADV-2006-2525\n[CVE-2006-3201](https://vulners.com/cve/CVE-2006-3201)\nBugtraq ID: 18603\n", "modified": "2006-06-27T04:33:56", "published": "2006-06-27T04:33:56", "href": "https://vulners.com/osvdb/OSVDB:26873", "id": "OSVDB:26873", "type": "osvdb", "title": "HP-UX Kernel Unspecified Local DoS", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2019-02-21T01:09:12", "bulletinFamily": "scanner", "description": "s700_800 11.23 POSIX real-time message queue update : \n\nA potential security vulnerability has been identified with HP-UX. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).", "modified": "2018-11-19T00:00:00", "id": "HPUX_PHKL_34194.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=21762", "published": "2006-06-27T00:00:00", "title": "HP-UX PHKL_34194 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHKL_34194. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21762);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2018/11/19 11:02:42\");\n\n script_cve_id(\"CVE-2006-3201\");\n script_xref(name:\"HP\", value:\"emr_na-c00705283\");\n script_xref(name:\"HP\", value:\"HPSBUX02127\");\n script_xref(name:\"HP\", value:\"SSRT051056\");\n\n script_name(english:\"HP-UX PHKL_34194 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.23 POSIX real-time message queue update : \n\nA potential security vulnerability has been identified with HP-UX. The\nvulnerability could be exploited by a local user to create a Denial of\nService (DoS).\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705283\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?219154e0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHKL_34194 or subsequent.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.23\"))\n{\n exit(0, \"The host is not affected since PHKL_34194 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHKL_34194\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OS-Core.CORE2-KRN\", version:\"B.11.23\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-02-21T01:09:12", "bulletinFamily": "scanner", "description": "s700_800 11.00 POSIX real-time message queue update : \n\nA potential security vulnerability has been identified with HP-UX. The vulnerability could be exploited by a local user to create a Denial of Service (DoS).", "modified": "2018-11-19T00:00:00", "id": "HPUX_PHKL_34192.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=21760", "published": "2006-06-27T00:00:00", "title": "HP-UX PHKL_34192 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and patch checks in this plugin were \n# extracted from HP patch PHKL_34192. The text itself is\n# copyright (C) Hewlett-Packard Development Company, L.P.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(21760);\n script_version(\"1.14\");\n script_cvs_date(\"Date: 2018/11/19 11:02:42\");\n\n script_cve_id(\"CVE-2006-3201\");\n script_xref(name:\"HP\", value:\"emr_na-c00705283\");\n script_xref(name:\"HP\", value:\"HPSBUX02127\");\n script_xref(name:\"HP\", value:\"SSRT051056\");\n\n script_name(english:\"HP-UX PHKL_34192 : HPSBUX02127 SSRT051056 - rev.1 HP-UX Kernel Local Denial of Service (DoS)\");\n script_summary(english:\"Checks for the patch in the swlist output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote HP-UX host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"s700_800 11.00 POSIX real-time message queue update : \n\nA potential security vulnerability has been identified with HP-UX. The\nvulnerability could be exploited by a local user to create a Denial of\nService (DoS).\"\n );\n # http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00705283\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?219154e0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install patch PHKL_34192 or subsequent.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:hp:hp-ux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2006/06/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2006/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2006-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"HP-UX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/HP-UX/version\", \"Host/HP-UX/swlist\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"hpux.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/HP-UX/version\")) audit(AUDIT_OS_NOT, \"HP-UX\");\nif (!get_kb_item(\"Host/HP-UX/swlist\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (!hpux_check_ctx(ctx:\"11.00\"))\n{\n exit(0, \"The host is not affected since PHKL_34192 applies to a different OS release.\");\n}\n\npatches = make_list(\"PHKL_34192\");\nforeach patch (patches)\n{\n if (hpux_installed(app:patch))\n {\n exit(0, \"The host is not affected because patch \"+patch+\" is installed.\");\n }\n}\n\n\nflag = 0;\nif (hpux_check_patch(app:\"OS-Core.CORE2-KRN\", version:\"B.11.00\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:hpux_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}]}