Unspecified vulnerability in CA Resource Initialization Manager (CAIRIM) 1.x before 20060502, as used in z/OS Common Services and the LMP component in multiple products, allows attackers to violate integrity via a certain "problem state program" that uses SVC to gain access to supervisor state, key 0.
References
Configurations
History
21 Nov 2024, 00:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/19953 - Patch, Vendor Advisory | |
References | () http://securitytracker.com/id?1016028 - Patch | |
References | () http://supportconnectw.ca.com/public/ca_common_docs/cairim-affprods.asp - | |
References | () http://supportconnectw.ca.com/public/ca_common_docs/cairimsecurity-notice.asp - Vendor Advisory | |
References | () http://www.osvdb.org/25234 - | |
References | () http://www.securityfocus.com/archive/1/433246/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17840 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/1656 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26234 - |
Information
Published : 2006-05-04 16:06
Updated : 2024-11-21 00:10
NVD link : CVE-2006-2201
Mitre link : CVE-2006-2201
CVE.ORG link : CVE-2006-2201
JSON object : View
Products Affected
broadcom
- resource_initialization_manager
CWE