[Info-vax] HP OpenVMS, local Denial of Service - HP Security Bulletin
VAXman- at SendSpamHere.ORG
VAXman- at SendSpamHere.ORG
Fri Apr 20 13:13:58 EDT 2012
In article <00AC027B.5A0E71C4 at SendSpamHere.ORG>, VAXman- @SendSpamHere.ORG writes:
>In article <xPfkr.81996$575.5342 at news.usenetserver.com>, "Jeff Goodwin" <jgoodwin at maine.rrr-r.com> writes:
>>
>>"JF Mezei" <jfmezei.spamnot at vaxination.ca> wrote in message
>>news:4f910ba0$0$20771$c3e8da3$f6268168 at news.astraweb.com...
>>> DTL wrote:
>>>> SUPPORT COMMUNICATION - SECURITY BULLETIN
>>>>
>>>> Document ID: c03281869
>>>> Version: 1
>>>>
>>>> HPSBOV02765 SSRT100828 rev.1 - HP OpenVMS, local Denial of Service (DoS)
>>>>
>>>> NOTICE: The information in this Security Bulletin should be acted upon as
>>>> soon as possible.
>>> This information is useless. It doesn't mention which component of VMS
>>> is at stake. ( IMAP ? X11 (XDM) ? POP ? SMTP ? or whatever other
>>> component ?)
>>>
>>> If they identified the component(s) at stake, then sites who make use of
>>> those components would know they are really vulnerable.
>>
>>SET.EXE, so it looks like it's for everyone. Probably a non-privileged
>>crash situation.
>
>According to the blurb accompanying the patch kit,
>
> "if SET PROCESS/SCHEDULING_CLASS command is executed on the
> node where the scheduling data base is not loaded causes
> the system crash."
>
The DETAILS are here on OpenVMS.org:
http://www.openvms.org/stories.php?story=12/03/30/4174918
--
VAXman- A Bored Certified VMS Kernel Mode Hacker VAXman(at)TMESIS(dot)ORG
Well I speak to machines with the voice of humanity.
More information about the Info-vax
mailing list