First published: Tue Aug 14 2001(Updated: )
Buffer overflow in dsh in dqs 3.2.7 in SuSE Linux 7.0 and earlier, and possibly other operating systems, allows local users to gain privileges via a long first command line argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =7.0 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0525 is considered a critical vulnerability as it allows local users to gain elevated privileges through a buffer overflow.
To fix CVE-2001-0525, upgrade to a supported version of SUSE Linux that has patched the vulnerable dqs component.
CVE-2001-0525 affects SUSE Linux 7.0, 6.4, and 6.3.
CVE-2001-0525 is a local vulnerability, meaning it can only be exploited by users with local access to the system.
CVE-2001-0525 is a buffer overflow vulnerability that occurs due to a long first command line argument being passed to dsh.