R-331: HP-UX Running the Ignite-UX or the DynRootDisk (DRD) get_system_info Command


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) R-331: HP-UX Running the Ignite-UX or the DynRootDisk (DRD) get_system_info Command
# 1  
Old 12-24-2007
R-331: HP-UX Running the Ignite-UX or the DynRootDisk (DRD) get_system_info Command

A potential security vulnerability has been identified in HP-UX running the Ignite-UX or the DynRootDisk (DRD) get_system_info command. The risk is LOW. Local unqualified configuration change.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. UNIX for Beginners Questions & Answers

Another one line command where I'd like to determine if Ubuntu or Red Hat when running command

Hello Forum, I'm making very good progress on my report thanks to the very helpful people on this forum. I've been able to successfully create my report for my Red Hat servers. But I do have a few ubuntu servers in the mix and I'd like to capture some data from them when an ssh connection is... (8 Replies)
Discussion started by: greavette
8 Replies

2. AIX

I'm facing problem with rpm command, when running the command and appears this error:

exec(): 0509-036 Cannot load program /usr/opt/freeware/bin/rpm because of the following errors: 0509-022 Cannot load module /opt/freeware/lib/libintl.a(libintl.so.1). 0509-150 Dependent module /opt/freeware/lib/libiconv.a(shr4.o) could not be loaded. 0509-152 Member... (4 Replies)
Discussion started by: Ohmkar
4 Replies

3. Shell Programming and Scripting

Command to check only Autosys running jobs with autorep like command

Hi, Is there any specific command to use to check only say Running jobs via autorep or similar command for Autosys? (0 Replies)
Discussion started by: sidnow
0 Replies

4. HP-UX

What is the difference between DRD and Root Mirror Disk using LVM mirror ?

what is the difference between DRD and Root Mirror Disk using LVM mirror ? (3 Replies)
Discussion started by: maxim42
3 Replies

5. UNIX for Dummies Questions & Answers

Running set options from the command line and bash command

I'm reading about debugging aids in bash and have come across the set command. It says in my little book that an addition to typing set you can also use them "on the command line when running a script..." and it lists this in a small table: set -o option Command Line... (5 Replies)
Discussion started by: Straitsfan
5 Replies

6. SuSE

inconsistent ls command display at the command prompt & running as a cron job

Sir, I using the following commands in a file (part of a bigger script): #!/bin/bash cd /opt/oracle/bin ls -lt | tail -1 | awk '{print $6}' >> /tmp/ramb.out If I run this from the command prompt the result is: 2007-05-16 if I run it as a cron job then... (5 Replies)
Discussion started by: rajranibl
5 Replies
Login or Register to Ask a Question
secdef(3)						     Library Functions Manual							 secdef(3)

NAME
secdef: open_secdef(), close_secdef(), get_secdef_str(), get_secdef_int() - security defaults configuration file routines SYNOPSIS
DESCRIPTION
opens the security configuration file This function must be called prior to calling or closes the security configuration file. and return the value of the specified parameter defined in the security configuration file. See the security(4) manpage. Programs using these routines must be compiled with APPLICATION USAGE
In a multithreaded application, these interfaces are thread-safe, but not async-cancel-safe. A cancellation point may occur when a thread is executing any of these interfaces. RETURN VALUE
returns a value of if the open completed successfully. Otherwise, it returns and leaves unchanged from the call. and return the follow- ing: The value of the specified parameter was successfully returned. The entry was not found, or the security configuration file was not opened. The format of the entry was incorrect. EXAMPLES
This example obtains the "path" from the parameter. FILES
Security defaults configuration file. SEE ALSO
security(4). secdef(3)