First published: Thu Sep 20 2001(Updated: )
Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Immunix | =7.0 | |
Immunix | =6.2 | |
Immunix | =7.0_beta | |
SUSE Linux | =6.2 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =6.2 | |
SUSE Linux | =6.0 | |
Red Hat Linux | =5.2 | |
SUSE Linux | =6.1 | |
SUSE Linux | =7.0 | |
SUSE Linux | =7.1 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0641 is considered a high severity vulnerability due to the potential for local users to execute arbitrary code.
To fix CVE-2001-0641, update the man program to a version that does not have this buffer overflow vulnerability.
CVE-2001-0641 affects various distributions of Linux, including Immunix, Red Hat, and SUSE Linux versions 5.2 to 7.1.
CVE-2001-0641 is a buffer overflow vulnerability that can be exploited by local users.
No, CVE-2001-0641 can only be exploited by local users with access to the system.