Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2001-1553

Опубликовано: 31 дек. 2001
Источник: debian

Описание

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
setiathomenot-affectedpackage

Связанные уязвимости

nvd
больше 23 лет назад

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.

github
около 3 лет назад

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.