First published: Thu Feb 06 1997(Updated: )
Buffer overflow of rlogin program using TERM environmental variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
bsdi bsd os | =1.1 | |
bsdi bsd os | =2.0 | |
bsdi bsd os | =2.0.1 | |
bsdi bsd os | =2.1 | |
Debian GNU/Linux | =0.93 | |
Digital Ultrix | ||
FreeBSD FreeBSD | =1.1.5.1 | |
FreeBSD FreeBSD | =2.0 | |
FreeBSD FreeBSD | =2.0.5 | |
FreeBSD FreeBSD | =2.1.0 | |
FreeBSD FreeBSD | =2.1.5 | |
HPE HP-UX | =10.00 | |
HPE HP-UX | =10.01 | |
HPE HP-UX | =10.08 | |
HPE HP-UX | =10.09 | |
HPE HP-UX | =10.10 | |
HPE HP-UX | =10.16 | |
HPE HP-UX | =10.20 | |
HPE HP-UX | =10.24 | |
HPE HP-UX | =10.30 | |
HPE HP-UX | =10.34 | |
IBM AIX | =3.2 | |
IBM AIX | =4.1 | |
IBM AIX | =4.1.1 | |
IBM AIX | =4.1.2 | |
IBM AIX | =4.1.3 | |
IBM AIX | =4.1.4 | |
IBM AIX | =4.1.5 | |
NetBSD NetBSD | =1.0 | |
NetBSD NetBSD | =1.1 | |
next nextstep | ||
Oracle Solaris SPARC | ||
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.6 | |
Oracle Solaris SPARC | =7.0 | |
Oracle Solaris SPARC | =8 | |
Sun SunOS | =4.1.3u1 | |
Sun SunOS | =4.1.4 | |
Sun SunOS | =5.3 | |
Sun SunOS | =5.4 | |
Sun SunOS | =5.5 | |
Sun SunOS | =5.5.1 | |
Data General DG/UX | =3.0 | |
Data General DG/UX | =1.0 | |
Data General DG/UX | =4.0 | |
Data General DG/UX | =2.0 | |
Digital Ultrix | =4.0 | |
Oracle Solaris SPARC | =2.4 | |
Digital Ultrix | =4.3a | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.5 | |
UNIX | =4.0 | |
next nextstep | =3.0 | |
next nextstep | =4.0 | |
next nextstep | =2.1 | |
next nextstep | =3.1 | |
UNIX | =4.0b | |
Digital Ultrix | =3.0 | |
Digital Ultrix | =4.3 | |
Digital Ultrix | =4.1 | |
Digital Ultrix | =4.4 | |
UNIX | =4.0a | |
next nextstep | =1.0a | |
next nextstep | =2.0 | |
Digital Ultrix | =2.2 | |
UNIX | =3.2g | |
next nextstep | =1.0 | |
Digital Ultrix | =4.2 | |
next nextstep | =3.3 | |
next nextstep | =3.2 | |
Digital Ultrix | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0046 is considered a high-severity vulnerability due to the potential for remote code execution through the buffer overflow.
To fix CVE-1999-0046, it is recommended to update the affected rlogin program to a version that eliminates the buffer overflow vulnerability.
CVE-1999-0046 affects multiple systems including various versions of BSDI BSD OS, FreeBSD, HP-UX, IBM AIX, Oracle Solaris, and others.
Exploitation of CVE-1999-0046 could allow an attacker to execute arbitrary code with the privileges of the rlogin program.
While CVE-1999-0046 is an older vulnerability, it remains relevant for legacy systems still in use that rely on the vulnerable rlogin feature.