First published: Thu May 03 2001(Updated: )
Format string vulnerability in man in some Linux distributions allows local users to gain privileges via a malformed -l parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =2.2 | |
Debian GNU/Linux | =2.2 | |
Debian GNU/Linux | =2.2 | |
Debian GNU/Linux | =2.2 | |
Debian GNU/Linux | =2.2 | |
SUSE Linux | =7.0 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.4 | |
Debian GNU/Linux | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0193 is classified as a high severity vulnerability due to its potential for privilege escalation.
To remediate CVE-2001-0193, update the 'man' utility to a version that is not vulnerable, typically found in recent distributions.
CVE-2001-0193 affects Debian Linux 2.2 and various versions of SUSE Linux including 6.3, 6.4, and 7.0.
CVE-2001-0193 is a format string vulnerability that allows local users to exploit a flaw in the 'man' command.
CVE-2001-0193 is not a remotely exploitable vulnerability; it requires local access to the system.