CVE-2003-0834

Buffer overflow in CDE libDtHelp library allows local users to execute arbitrary code via (1) a modified DTHELPUSERSEARCHPATH environment variable and the Help feature, (2) DTSEARCHPATH, or (3) LOGNAME.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:sco:open_unix:8.0:*:*:*:*:*:*:*
cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*
cpe:2.3:o:sco:unixware:7.1.3:*:*:*:*:*:*:*

History

20 Nov 2024, 23:45

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20040801-01-P - () ftp://patches.sgi.com/support/free/security/advisories/20040801-01-P -
References () http://archives.neohapsis.com/archives/hp/2003-q4/0047.html - () http://archives.neohapsis.com/archives/hp/2003-q4/0047.html -
References () http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57414 - () http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57414 -
References () http://www.idefense.com/application/poi/display?id=134&type=vulnerabilities&flashstatus=false - () http://www.idefense.com/application/poi/display?id=134&type=vulnerabilities&flashstatus=false -
References () http://www.kb.cert.org/vuls/id/575804 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/575804 - Patch, Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/8973 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/8973 - Patch, Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5141 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5141 -

Information

Published : 2003-12-01 05:00

Updated : 2025-04-03 01:03


NVD link : CVE-2003-0834

Mitre link : CVE-2003-0834

CVE.ORG link : CVE-2003-0834


JSON object : View

Products Affected

sco

  • open_unix
  • unixware