Overview
The HP Tru64 UNIX implementation of "ypmatch" contains a locally exploitable buffer overflow.
Description
"ypmatch" is used to print the value of keys from an NIS map. A locally exploitable buffer overflow in ypmatch may permit a local attacker to gain elevated privileges and execute arbitrary code on a vulnerable host. |
Impact
A local user may be able to gain elevated privileges and execute arbitrary code. |
Solution
Apply a patch. |
Vendor Information
706817
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://wwss1pro.compaq.com/support/reference_library/viewdocument.asp?source=SRB0039W.xml&dt=11
- http://www.tru64unix.compaq.com/docs/base_doc/DOCUMENTATION/V50_HTML/MAN/MAN1/0501____.HTM
- http://216.239.37.100/search?q=cache:sSZtL4yexyoJ:www.ciac.org/ciac/bulletins/m-118.shtml+SSRT2277&hl=en&ie=UTF-8
Acknowledgements
This document was written by Ian A Finlay.
Other Information
CVE IDs: | None |
Severity Metric: | 9.00 |
Date Public: | 2002-08-31 |
Date First Published: | 2002-09-05 |
Date Last Updated: | 2002-09-05 16:13 UTC |
Document Revision: | 6 |