First published: Thu Jan 06 2000(Updated: )
Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.3 | |
Oracle Solaris SPARC | =2.4 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.5 | |
Sun SunOS | =5.7 | |
Sun SunOS | =5.5 | |
Oracle Solaris SPARC | =7.0 | |
Sun SunOS | =5.4 | |
Sun SunOS | =5.5.1 | |
Oracle Solaris SPARC | =2.6 | |
Sun SunOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0055 is considered critical due to its potential for local users to gain root access.
To fix CVE-2000-0055, you should apply the patches provided by Oracle for the affected Solaris versions.
CVE-2000-0055 affects Solaris versions 2.4, 2.5, 2.6 and SunOS versions 5.3, 5.4, 5.5, 5.5.1, and 5.7.
CVE-2000-0055 cannot be exploited remotely as it requires local user access to trigger the buffer overflow.
The -n option in the Solaris chkperm command allows users to specify a username, but can be exploited if excessively long input is provided.