Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2001-1553

Опубликовано: 31 дек. 2001
Источник: debian
EPSS Низкий

Описание

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
setiathomenot-affectedpackage

EPSS

Процентиль: 27%
0.00091
Низкий

Связанные уязвимости

nvd
больше 23 лет назад

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.

github
больше 3 лет назад

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.

EPSS

Процентиль: 27%
0.00091
Низкий