First published: Fri Dec 31 1999(Updated: )
Buffer overflow in SysVInit in Red Hat Linux 5.1 and earlier allows local users to gain privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | <=5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-1999-1329 vulnerability is considered to have a high severity due to its potential for local privilege escalation.
To fix CVE-1999-1329, it is essential to upgrade to a version of Red Hat Linux later than 5.1 that does not contain the buffer overflow vulnerability.
CVE-1999-1329 is caused by a buffer overflow in the SysVInit component of Red Hat Linux 5.1 and earlier, allowing local users to exploit the flaw.
Local users operating on Red Hat Linux 5.1 and earlier are primarily affected by CVE-1999-1329 due to unsafe handling of inputs.
The consequences of CVE-1999-1329 include unauthorized privilege escalation, which can lead to system compromise by local attackers.