Vulnerability Name: | CVE-1999-0691 (CCN-3241) | ||||||||
Assigned: | 1999-09-13 | ||||||||
Published: | 1999-09-13 | ||||||||
Updated: | 2018-10-30 | ||||||||
Summary: | Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: SGI Security Advisory 20011107-01-P CDE vulnerabilities Source: CCN Type: SGI Security Advisory 20020302-01-A Additional CDE and CDE ToolTalk Vulnerabilities Source: CCN Type: BugTraq Mailing List, Mon, 13 Sep 1999 16:04:35 +0200 Vulnerability in dtaction Source: MITRE Type: CNA CVE-1999-0691 Source: CCN Type: Compaq Services Software Patches SSRTO615U_DTACTION SSRTO615U_DTACTION Potential Security Problem when using dtaction Source: CCN Type: Sun Microsystems, Inc. Security Bulletin #00185 Common Desktop Environment (CDE) Source: SUN Type: UNKNOWN 00192 Source: CCN Type: Sun Microsystems, Inc. Security Bulletin #00192 CDE and OpenWindows Source: CCN Type: Hewlett-Packard Company Security Bulletin HPSBUX9909-103 Security Vulnerability in CDE ttsession (Rev.01) Source: CCN Type: IBM Technical Support Web site AIX General Software Fixes Source: CCN Type: CERT Advisory CA-1999-11 Four Vulnerabilities in the Common Desktop Environment Source: CCN Type: ITSX Web site dtaction hole Source: CCN Type: OSVDB ID: 1071 Multiple Vendor CDE dtaction AddSuLog Function Local Overflow Source: BID Type: UNKNOWN 635 Source: CCN Type: BID-635 Multiple Vendor CDE dtaction Userflag Buffer Overflow Vulnerability Source: HP Type: UNKNOWN HPSBUX9909-103 Source: XF Type: UNKNOWN cde-dtaction-username-bo(3241) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:3078 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |