First published: Thu May 24 2001(Updated: )
Buffer overflow in dtsession on Solaris, and possibly other operating systems, allows local users to gain privileges via a long LANG environmental variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.7 | |
Sun SunOS | =5.8 | |
Oracle Solaris and Zettabyte File System (ZFS) | =7.0 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.6 | |
Oracle Solaris and Zettabyte File System (ZFS) | =8.0 | |
Sun SunOS | ||
SunOS | ||
SunOS | =5.7 | |
SunOS | =5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0426 is considered to be of high severity due to the potential for local users to gain elevated privileges.
To fix CVE-2001-0426, you should limit the length of the LANG environmental variable or apply available patches for the affected Solaris versions.
CVE-2001-0426 affects multiple versions of Solaris, including 2.6, 5.7, 5.8, and Solaris 7.0 and 8.0.
CVE-2001-0426 is a local vulnerability and cannot be exploited remotely.
Local users on affected Solaris systems are at risk due to CVE-2001-0426.