[Info-vax] HP OpenVMS, local Denial of Service - HP Security Bulletin
VAXman- at SendSpamHere.ORG
VAXman- at SendSpamHere.ORG
Fri Apr 20 12:41:20 EDT 2012
In article <xPfkr.81996$575.5342 at news.usenetserver.com>, "Jeff Goodwin" <jgoodwin at maine.rrr-r.com> writes:
>
>"JF Mezei" <jfmezei.spamnot at vaxination.ca> wrote in message
>news:4f910ba0$0$20771$c3e8da3$f6268168 at news.astraweb.com...
>> DTL wrote:
>>> SUPPORT COMMUNICATION - SECURITY BULLETIN
>>>
>>> Document ID: c03281869
>>> Version: 1
>>>
>>> HPSBOV02765 SSRT100828 rev.1 - HP OpenVMS, local Denial of Service (DoS)
>>>
>>> NOTICE: The information in this Security Bulletin should be acted upon as
>>> soon as possible.
>> This information is useless. It doesn't mention which component of VMS
>> is at stake. ( IMAP ? X11 (XDM) ? POP ? SMTP ? or whatever other
>> component ?)
>>
>> If they identified the component(s) at stake, then sites who make use of
>> those components would know they are really vulnerable.
>
>SET.EXE, so it looks like it's for everyone. Probably a non-privileged
>crash situation.
According to the blurb accompanying the patch kit,
"if SET PROCESS/SCHEDULING_CLASS command is executed on the
node where the scheduling data base is not loaded causes
the system crash."
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
Well I speak to machines with the voice of humanity.
More information about the Info-vax
mailing list