First published: Thu Jul 17 1997(Updated: )
Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dericia Delicia | =5.2 | |
Caldera OpenLinux Lite | =1.1 | |
Debian | =4.0 | |
lst lst power linux | =2.2 | |
Red Hat Linux | =4.0 | |
Red Hat Linux | =4.1 | |
Red Hat Linux | =4.2 | |
SUSE Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1182 has been classified as a high severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-1999-1182, update the affected Linux systems and software packages to the latest versions that include the necessary patches.
CVE-1999-1182 affects multiple Linux distributions including Delix DLD, Caldera OpenLinux Lite, Debian GNU/Linux, Red Hat Linux versions 4.0 to 4.2, and SUSE Linux 5.0.
CVE-1999-1182 is a buffer overflow vulnerability found in the run-time linkers ld.so and ld-linux.so, allowing privilege escalation.
No, CVE-1999-1182 requires local user access to exploit the vulnerability by calling a setuid program with a manipulated program name.