First published: Mon May 28 2001(Updated: )
Buffer overflow in ultimate_source function of man 1.5 and earlier allows local users to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =5.1 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =5.0 | |
Red Hat Linux | =5.2 | |
Red Hat Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1028 has a high severity rating due to its potential to allow local users to gain elevated privileges.
To fix CVE-2001-1028, update the man package to the latest version provided by your distribution that addresses this vulnerability.
CVE-2001-1028 affects Red Hat Linux versions 5.0 through 6.2.
Local users with access to the system can exploit CVE-2001-1028 due to the buffer overflow vulnerability.
The impact of CVE-2001-1028 is significant as it may allow unauthorized users to gain high-level privileges on the affected system.