4.3
CVSSv2

CVE-2005-3566

Published: 16/11/2005 Updated: 11/07/2017
CVSS v2 Base Score: 4.3 | Impact Score: 6.4 | Exploitability Score: 3.1
VMScore: 435
Vector: AV:L/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in various ha commands of VERITAS Cluster Server for UNIX prior to 4.0MP2 allows local users to execute arbitrary code via a long VCSI18N_LANG environment variable to (1) haagent, (2) haalert, (3) haattr, (4) hacli, (5) hacli_runcmd, (6) haclus, (7) haconf, (8) hadebug, (9) hagrp, (10) hahb, (11) halog, (12) hareg, (13) hares, (14) hastatus, (15) hasys, (16) hatype, (17) hauser, and (18) tststew.

Vulnerable Product Search on Vulmon Subscribe to Product

symantec veritas cluster server 2.2_linux

symantec veritas cluster server 2.2_linux_mp1p1

symantec veritas cluster server 2.2_mp1

symantec veritas cluster server 3.5_mp1

symantec veritas cluster server 3.5_mp1j

symantec veritas cluster server 3.5_solaris_mp3

symantec veritas cluster server 4.0_aix

symantec veritas storage foundation 1.0_aix

symantec veritas storage foundation 2.2_linux

symantec veritas storage foundation 4.0_linux

symantec veritas storage foundation 4.0_solaris

symantec veritas cluster server 3.5_aix

symantec veritas cluster server 3.5_hp-ux

symantec veritas cluster server 3.5_solaris

symantec veritas cluster server 3.5_solaris_beta

symantec veritas cluster server 4.0_linux_beta

symantec veritas cluster server 4.0_solaris

symantec veritas storage foundation 3.4_aix

symantec veritas storage foundation 3.5_hp-ux

symantec veritas storage foundation cluster file system 4.0_solaris

symantec veritas cluster server 2.2_mp2

symantec veritas cluster server 3.5

symantec veritas cluster server 3.5_mp2

symantec veritas cluster server 3.5_p1

symantec veritas cluster server 4.0_aix_beta

symantec veritas cluster server 4.0_linux

symantec veritas storage foundation 2.2_vmware_esx

symantec veritas storage foundation 3.0_aix

symantec veritas storage foundation cluster file system 4.0_aix

symantec veritas storage foundation cluster file system 4.0_linux

symantec veritas cluster server 2.2

symantec veritas cluster server 3.5_hp-ux_update_1

symantec veritas cluster server 3.5_hp-ux_update_2

symantec veritas cluster server 3.5_solaris_mp1

symantec veritas cluster server 3.5_solaris_mp2

symantec veritas cluster server 4.0_solaris_beta

symantec veritas cluster server 4.0_solaris_mp1

symantec veritas sanpoint control quickstart 3.5_solaris

symantec veritas storage foundation 3.5_solaris

symantec veritas storage foundation 4.0_aix

Exploits

#!/usr/bin/perl -w # # Veritas Storage Foundation 40 # # wwwdigitalmunitioncom # kf (kf_lists[at]digitalmunition[dot]com) - 08/19/2005 # # This bug has not been patched as of: # Q14438Hsf40000rhel3_i686targz # # Make sure you don't get your sploits from some # Frenchie at FR-SIRT go to milw0rm instead # $retval = 0xbffffc17; $t ...