Lucene search

K
nvd[email protected]NVD:CVE-2005-3566
HistoryNov 16, 2005 - 7:42 a.m.

CVE-2005-3566

2005-11-1607:42:00
web.nvd.nist.gov
2

CVSS2

4.3

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

AI Score

7.7

Confidence

High

EPSS

0

Percentile

0.4%

Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX before 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew.

Affected configurations

Nvd
Node
symantec_veritascluster_serverMatch2.2
OR
symantec_veritascluster_serverMatch2.2_linux
OR
symantec_veritascluster_serverMatch2.2_linux_mp1p1
OR
symantec_veritascluster_serverMatch2.2_mp1
OR
symantec_veritascluster_serverMatch2.2_mp2
OR
symantec_veritascluster_serverMatch3.5
OR
symantec_veritascluster_serverMatch3.5_aix
OR
symantec_veritascluster_serverMatch3.5_hp-ux
OR
symantec_veritascluster_serverMatch3.5_hp-ux_update_1
OR
symantec_veritascluster_serverMatch3.5_hp-ux_update_2
OR
symantec_veritascluster_serverMatch3.5_mp1
OR
symantec_veritascluster_serverMatch3.5_mp1j
OR
symantec_veritascluster_serverMatch3.5_mp2
OR
symantec_veritascluster_serverMatch3.5_p1
OR
symantec_veritascluster_serverMatch3.5_solaris
OR
symantec_veritascluster_serverMatch3.5_solaris_beta
OR
symantec_veritascluster_serverMatch3.5_solaris_mp1
OR
symantec_veritascluster_serverMatch3.5_solaris_mp2
OR
symantec_veritascluster_serverMatch3.5_solaris_mp3
OR
symantec_veritascluster_serverMatch4.0_aix
OR
symantec_veritascluster_serverMatch4.0_aix_beta
OR
symantec_veritascluster_serverMatch4.0_linux
OR
symantec_veritascluster_serverMatch4.0_linux_beta
OR
symantec_veritascluster_serverMatch4.0_solaris
OR
symantec_veritascluster_serverMatch4.0_solaris_beta
OR
symantec_veritascluster_serverMatch4.0_solaris_mp1
OR
symantec_veritassanpoint_control_quickstartMatch3.5_solaris
OR
symantec_veritasstorage_foundationMatch1.0_aix
OR
symantec_veritasstorage_foundationMatch2.2_linux
OR
symantec_veritasstorage_foundationMatch2.2_vmware_esx
OR
symantec_veritasstorage_foundationMatch3.0_aix
OR
symantec_veritasstorage_foundationMatch3.4_aix
OR
symantec_veritasstorage_foundationMatch3.5_hp-ux
OR
symantec_veritasstorage_foundationMatch3.5_solaris
OR
symantec_veritasstorage_foundationMatch4.0_aix
OR
symantec_veritasstorage_foundationMatch4.0_linux
OR
symantec_veritasstorage_foundationMatch4.0_solaris
OR
symantec_veritasstorage_foundation_cluster_file_systemMatch4.0_aix
OR
symantec_veritasstorage_foundation_cluster_file_systemMatch4.0_linux
OR
symantec_veritasstorage_foundation_cluster_file_systemMatch4.0_solaris
VendorProductVersionCPE
symantec_veritascluster_server2.2cpe:2.3:a:symantec_veritas:cluster_server:2.2:*:*:*:*:*:*:*
symantec_veritascluster_server2.2_linuxcpe:2.3:a:symantec_veritas:cluster_server:2.2_linux:*:*:*:*:*:*:*
symantec_veritascluster_server2.2_linux_mp1p1cpe:2.3:a:symantec_veritas:cluster_server:2.2_linux_mp1p1:*:*:*:*:*:*:*
symantec_veritascluster_server2.2_mp1cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp1:*:*:*:*:*:*:*
symantec_veritascluster_server2.2_mp2cpe:2.3:a:symantec_veritas:cluster_server:2.2_mp2:*:*:*:*:*:*:*
symantec_veritascluster_server3.5cpe:2.3:a:symantec_veritas:cluster_server:3.5:*:*:*:*:*:*:*
symantec_veritascluster_server3.5_aixcpe:2.3:a:symantec_veritas:cluster_server:3.5_aix:*:*:*:*:*:*:*
symantec_veritascluster_server3.5_hp-uxcpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux:*:*:*:*:*:*:*
symantec_veritascluster_server3.5_hp-ux_update_1cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_1:*:*:*:*:*:*:*
symantec_veritascluster_server3.5_hp-ux_update_2cpe:2.3:a:symantec_veritas:cluster_server:3.5_hp-ux_update_2:*:*:*:*:*:*:*
Rows per page:
1-10 of 401

CVSS2

4.3

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

AI Score

7.7

Confidence

High

EPSS

0

Percentile

0.4%

Related for NVD:CVE-2005-3566