First published: Tue Jan 04 2000(Updated: )
The SCO UnixWare privileged process system allows local users to gain root privileges by using a debugger such as gdb to insert traps into _init before the privileged process is executed.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xinuos UnixWare | =7.1 | |
Xinuos UnixWare | =7.1.1 | |
Xinuos UnixWare | =7.0 | |
Xinuos UnixWare | =7.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0979 is considered a critical vulnerability as it allows local users to gain root privileges.
To mitigate CVE-1999-0979, ensure that your system is updated with the latest security patches from Xinuos for UnixWare.
CVE-1999-0979 affects local users of Xinuos UnixWare versions 7.0, 7.0.1, 7.1, and 7.1.1.
Attackers can exploit CVE-1999-0979 to gain unauthorized root access on affected UnixWare systems.
CVE-1999-0979 is less relevant for modern systems, but organizations still running vulnerable versions of UnixWare should address it immediately.