[Info-vax] HP OpenVMS, local Denial of Service - HP Security Bulletin

VAXman- at SendSpamHere.ORG VAXman- at SendSpamHere.ORG
Fri Apr 20 13:13:58 EDT 2012


In article <00AC027B.5A0E71C4 at SendSpamHere.ORG>, VAXman-  @SendSpamHere.ORG writes:
>In article <xPfkr.81996$575.5342 at news.usenetserver.com>, "Jeff Goodwin" <jgoodwin at maine.rrr-r.com> writes:
>>
>>"JF Mezei" <jfmezei.spamnot at vaxination.ca> wrote in message 
>>news:4f910ba0$0$20771$c3e8da3$f6268168 at news.astraweb.com...
>>> DTL wrote:
>>>> SUPPORT COMMUNICATION - SECURITY BULLETIN
>>>>
>>>> Document ID: c03281869
>>>> Version: 1
>>>>
>>>> HPSBOV02765 SSRT100828 rev.1 - HP OpenVMS, local Denial of Service (DoS)
>>>>
>>>> NOTICE: The information in this Security Bulletin should be acted upon as 
>>>> soon as possible.
>>> This information is useless. It doesn't mention which component of VMS
>>> is at stake. ( IMAP ?  X11 (XDM)  ?  POP ? SMTP ? or whatever other
>>> component ?)
>>>
>>> If they identified the component(s) at stake, then sites who make use of
>>> those components would know they are really vulnerable.
>>
>>SET.EXE, so it looks like it's for everyone.  Probably a non-privileged 
>>crash situation.
>
>According to the blurb accompanying the patch kit, 
>
>  "if SET PROCESS/SCHEDULING_CLASS command is executed on the
>   node where the scheduling data base is not loaded causes
>   the system crash."
>

The DETAILS are here on OpenVMS.org:

http://www.openvms.org/stories.php?story=12/03/30/4174918

-- 
VAXman- A Bored Certified VMS Kernel Mode Hacker    VAXman(at)TMESIS(dot)ORG

Well I speak to machines with the voice of humanity.



More information about the Info-vax mailing list