First published: Sat Apr 26 1997(Updated: )
Buffer overflow in xlock program allows local users to execute commands as root.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Data General DG/UX | =1.0 | |
Data General DG/UX | =2.0 | |
Data General DG/UX | =3.0 | |
Data General DG/UX | =4.0 | |
Data General DG/UX | =5.0 | |
Data General DG/UX | =6.0 | |
Data General DG/UX | =7.0 | |
SGI IRIX | =5.0 | |
SGI IRIX | =5.0.1 | |
SGI IRIX | =5.1 | |
SGI IRIX | =5.1.1 | |
SGI IRIX | =5.2 | |
SGI IRIX | =5.3 | |
SGI IRIX | =5.3 | |
SGI IRIX | =6.0 | |
SGI IRIX | =6.0.1 | |
SGI IRIX | =6.0.1 | |
SGI IRIX | =6.1 | |
SGI IRIX | =6.3 | |
SGI IRIX | =6.4 | |
BSDI BSD/OS | =2.1 | |
Debian | =0.93 | |
Debian | =1.1 | |
Debian | =1.2 | |
Debian | =1.3 | |
HPE HP-UX | =10.00 | |
HPE HP-UX | =10.01 | |
HPE HP-UX | =10.08 | |
HPE HP-UX | =10.10 | |
HPE HP-UX | =10.16 | |
HPE HP-UX | =10.20 | |
HPE HP-UX | =10.24 | |
HPE HP-UX | =10.30 | |
HPE HP-UX | =10.34 | |
IBM AIX | =3.2 | |
IBM AIX | =4.1 | |
IBM AIX | =4.2 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.4 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.5 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.5.1 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.5.1 | |
Sun SunOS | =5.3 | |
Sun SunOS | =5.4 | |
Sun SunOS | =5.5 | |
Sun SunOS | =5.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-1999-0038 is considered high due to the potential for local users to execute arbitrary commands as root.
Fixing CVE-1999-0038 involves updating the xlock program to a version that does not contain this buffer overflow vulnerability.
CVE-1999-0038 affects various versions of Data General DG/UX, SGI IRIX, Debian GNU/Linux, HPE HP-UX, IBM AIX, and Oracle Solaris.
CVE-1999-0038 can be exploited by local users with access to the affected systems.
Yes, there are patches available for CVE-1999-0038, typically found with software updates for the affected systems.