First published: Thu May 16 2002(Updated: )
Buffer overflow in cpr for the eoe.sw.cpr SGI Checkpoint-Restart Software package on SGI IRIX 6.5.10 and earlier may allow local users to gain root privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =6.5.9f | |
SGI IRIX | =6.5.6 | |
SGI IRIX | =5.3 | |
SGI IRIX | =6.0.1 | |
SGI IRIX | =6.5.4m | |
SGI IRIX | =6.5.3f | |
SGI IRIX | =6.5.1 | |
SGI IRIX | =6.5.4f | |
SGI IRIX | =6.5.10 | |
SGI IRIX | =6.1 | |
SGI IRIX | =6.5.9m | |
SGI IRIX | =6.5.10m | |
SGI IRIX | =5.0.1 | |
SGI IRIX | =5.1.1 | |
SGI IRIX | =6.5.7m | |
SGI IRIX | =6.5.9 | |
SGI IRIX | =6.4 | |
SGI IRIX | =6.5.2f | |
SGI IRIX | =5.0 | |
SGI IRIX | =6.5.2m | |
SGI IRIX | =6.5.8m | |
SGI IRIX | =6.5.6f | |
SGI IRIX | =6.5.7f | |
SGI IRIX | =6.5.3 | |
SGI IRIX | =5.1 | |
SGI IRIX | =6.5.3m | |
SGI IRIX | =6.5.8 | |
SGI IRIX | =6.5.5 | |
SGI IRIX | =5.2 | |
SGI IRIX | =6.5.4 | |
SGI IRIX | =6.0 | |
SGI IRIX | =6.3 | |
SGI IRIX | =6.5.6m | |
SGI IRIX | =6.5.2 | |
SGI IRIX | =6.5.8f | |
SGI IRIX | =6.5.5f | |
SGI IRIX | =6.5 | |
SGI IRIX | =6.5.7 | |
SGI IRIX | =6.2 | |
SGI IRIX | =6.5.10f | |
SGI IRIX | =6.5.5m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0173 has a high severity due to its potential to allow local users to gain root privileges.
To fix CVE-2002-0173, it is recommended to upgrade to a patched version of the SGI IRIX operating system.
CVE-2002-0173 affects multiple versions of the SGI IRIX operating system, particularly versions prior to 6.5.10.
The consequences of CVE-2002-0173 include unauthorized access and control over the system due to local privilege escalation.
CVE-2002-0173 can be exploited by local users exploiting the buffer overflow in the cpr tool.