First published: Thu May 24 2001(Updated: )
Buffer overflow in lpsched on DGUX version R4.20MU06 and MU02 allows a local attacker to obtain root access via a long command line argument (non-existent printer name).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Digital OpenVMS | =r4.20mu06 | |
Digital OpenVMS | =mu02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0369 has a high severity rating due to its potential for local attackers to gain root access.
To fix CVE-2001-0369, update your DGUX system to a secure version that does not contain the buffer overflow vulnerability.
CVE-2001-0369 affects users of DGUX version R4.20MU06 and MU02.
CVE-2001-0369 exploits a buffer overflow in the lpsched service through long command line arguments.
No, CVE-2001-0369 requires local access to exploit, making it a local privilege escalation vulnerability.