First published: Mon Sep 13 1999(Updated: )
The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
cde cde | =1.0.1 | |
cde cde | =1.0.2 | |
cde cde | =1.1 | |
cde cde | =2.1 | |
cde cde | =1.2 | |
cde cde | =2.120 | |
cde cde | =2.0 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.5 | |
Sun SunOS | =5.7 | |
Sun SunOS | =5.5 | |
Oracle Solaris SPARC | =7.0 | |
Sun SunOS | =5.5.1 | |
Oracle Solaris SPARC | =2.6 | |
Sun SunOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0689 is categorized as a local privilege escalation vulnerability.
To fix CVE-1999-0689, it is recommended to update to a patched version of CDE that addresses this issue.
CVE-1999-0689 affects multiple versions of the CDE dtspcd daemon including 1.0.1, 1.0.2, 1.1, and 2.1.
CVE-1999-0689 exploits a symlink attack that allows local users to execute arbitrary commands.
A potential workaround for CVE-1999-0689 is to restrict access to the dtspcd daemon or disable it entirely if not needed.