Buffer overflow in setiathome for SETI@home 3.03, if installed setuid, could allow local users to execute arbitrary code via long command line options (1) socks_server, (2) socks_user, and (3) socks_passwd. NOTE: since the default configuration of setiathome is not setuid, perhaps this issue should not be included in CVE.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/vuln-dev/2001-q4/0662.html | Vendor Advisory |
http://archives.neohapsis.com/archives/vuln-dev/2001-q4/0662.html | Vendor Advisory |
Configurations
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vuln-dev/2001-q4/0662.html - Vendor Advisory |
Information
Published : 2001-12-31 05:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1553
Mitre link : CVE-2001-1553
CVE.ORG link : CVE-2001-1553
JSON object : View
Products Affected
university_of_california
- seti_at_home
CWE