[Info-vax] HP OpenVMS, local Denial of Service - HP Security Bulletin

VAXman- at SendSpamHere.ORG VAXman- at SendSpamHere.ORG
Fri Apr 20 12:41:20 EDT 2012


In article <xPfkr.81996$575.5342 at news.usenetserver.com>, "Jeff Goodwin" <jgoodwin at maine.rrr-r.com> writes:
>
>"JF Mezei" <jfmezei.spamnot at vaxination.ca> wrote in message 
>news:4f910ba0$0$20771$c3e8da3$f6268168 at news.astraweb.com...
>> DTL wrote:
>>> SUPPORT COMMUNICATION - SECURITY BULLETIN
>>>
>>> Document ID: c03281869
>>> Version: 1
>>>
>>> HPSBOV02765 SSRT100828 rev.1 - HP OpenVMS, local Denial of Service (DoS)
>>>
>>> NOTICE: The information in this Security Bulletin should be acted upon as 
>>> soon as possible.
>> This information is useless. It doesn't mention which component of VMS
>> is at stake. ( IMAP ?  X11 (XDM)  ?  POP ? SMTP ? or whatever other
>> component ?)
>>
>> If they identified the component(s) at stake, then sites who make use of
>> those components would know they are really vulnerable.
>
>SET.EXE, so it looks like it's for everyone.  Probably a non-privileged 
>crash situation.

According to the blurb accompanying the patch kit, 

  "if SET PROCESS/SCHEDULING_CLASS command is executed on the
   node where the scheduling data base is not loaded causes
   the system crash."

-- 
VAXman- A Bored Certified VMS Kernel Mode Hacker    VAXman(at)TMESIS(dot)ORG

Well I speak to machines with the voice of humanity.



More information about the Info-vax mailing list