Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2001-1553

Опубликовано: 31 дек. 2001
Источник: debian

Описание

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
setiathomenot-affectedpackage

Связанные уязвимости

nvd
почти 24 года назад

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.

github
больше 3 лет назад

Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.