Описание
Buffer overflow in Linuxconf before 1.28r4 allows local users to execute arbitrary code via a long LINUXCONF_LANG environment variable, which overflows an error string that is generated.
Ссылки
- ExploitPatchVendor Advisory
- PatchVendor Advisory
- ExploitPatchVendor Advisory
- ExploitPatchVendor Advisory
- PatchVendor Advisory
- ExploitPatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:jacques_gelinas:linuxconf:1.1.6r10:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.1.9r1:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.1.9r2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r1:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r3:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r4:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r5:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r6:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r7:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r8:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.3r1:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.3r2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4r2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4r4:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4r5:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2r1:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2r2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.27:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.27r3:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.27r4:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.27r5:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.28:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.28r1:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.28r2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.28r3:*:*:*:*:*:*:*
EPSS
Процентиль: 42%
0.002
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
больше 22 лет назад
Buffer overflow in Linuxconf before 1.28r4 allows local users to execu ...
github
больше 3 лет назад
Buffer overflow in Linuxconf before 1.28r4 allows local users to execute arbitrary code via a long LINUXCONF_LANG environment variable, which overflows an error string that is generated.
EPSS
Процентиль: 42%
0.002
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other