HP Security Bulletin - A potential security vulnerability has been identified with HP OpenVMS VAX version 7.x and 6.x and OpenVMS Alpha Version 7.x or 6.x that may allow a local authorized user to gain unauthorized privileged access to data and system resources.
e283f4530ed6c29bc71d9222276c349099fe3ce03e49783411729c4b5ee35948
This DCL script abuses the old psi_mail trick on VAX/VMS systems to remotely find valid users.
b300bdc9bf7a8a50ee833fcd7c6502f1b542165feca28c88b135ae16d0afbccb
The VAX/VMS SYSUAF.DAT file
6db5f02a89d9f855c5c4c403739ac7cf4eab981419ebd9432ce48317003f8af4
User's Guide to VAX/VMS
9bcd6d3745388882a781c2aefa4fab2b99d235a358c570916704a16554183fff
Modernz #11. VMS / VAX
92c17202ab7e42f9ed9e940f14fa64a6286e6e0164f04192cad5382a899a8e00
CERT Advisory - VAX/VMS Breakins
678fabc6f4c1f721eb5c79d95da5010bb04ded5ba0fee7f414cb9acd134b6e4f
DECnet, UNIX UUCP files, VAX - Tekno DCS help,
99eb7828d2e2376fc4aafc3c9d12d5b66c719541bd3d881eb25b611be2fcd130
Pretty complete file on hacking VAX/VMS machines
fded398f666c3ef34df23fef88ba3fa0d9ddc41380098bee0d18a027f0088ee5
Default passwords for VAX/VMS, DEC-10, TOPS 10,
b78a809d7aa0681bebae4753b22f49f06d1cc29de774788f53d66f4668e95f83
A VAX decoy script to grab some accunts.
10c495947cd6255e3f046faf7c7abd4c82d48102cc2b4b5fce27af0a91bb5d62
How to hack VAX's.
6e77499fa9addda1bb2eec4cc5ab02a27d57f2ae6ccc8d3689a6a5d10dd30eb8
VAX/VMS hacking FAQ
48fd9e70ee8219bfbd11d8e0b30f9d3eb2b405ecd8bff17c610b219c2ec81a7f
Network Associates COVERT Labs Security Advisory - The L-Soft LISTSERV web archive (wa,wa.exe) component contains an unchecked buffer allowing remote execution of arbitrary code with the privileges of the LISTSERV daemon. Vulnerable systems include L-Soft LISTSERV Web Archives 1.8d (confirmed) and 1.8c (inferred) for Windows 9x, Windows NT 3.5x, Windows NT 4.0, Windows 2000, UNIX (all vendors), and OpenVMS VAX.
a3eaef27c0c60ab4d4d042110fa7fbaa9e62953241047c765cb69fd3ca8bafd8
bt systemx switch administration and overview of bt telcom operations and maintanance centers, written for f41th magazine. the system is based on a vax/vms platform with multi-level oracle databases, a look into the man-machine interface of uk switching, and remote switch/node interfaces.
779a4ec91dd89436fd5f104ed274d52dc3ddd09f544a61c1d4556c2c9473b03f
Subject VAX/VMS failure to disable user accounts Date 13-Feb-93
3ba2df70d6ea24b6027f6d3cf171eb456a56abe81f6aa5e803dfe82cee04c926
NetBSD uses the ptrace(2) system call to trace and debug other processes. The debugging process can also modify the internal registers, including the status (PSL) register, for the process being debugged. Besides the normal user-accessible flags, the VAX hardware also stores information about privilege levels and used stacks in the PSL. Those flags are only altered via the instruction REI (return from interrupt) or LDPCTX (load process context) and cannot be modified while running in "user" mode. NetBSD security page here.
a2eae820bbf7e17d7b14c389412aaa0a20c9afbfb8e698cf5ca9f30212b728e8
A potential vulnerability with LOGINOUT for OpenVMS (VAX & ALPHA) V7.1 software has been discovered.
3e8106358b6ad412379299f5afe49241a919c73c87e12dbc81212d2d315cdfd3