First published: Mon Aug 12 2002(Updated: )
Buffer overflow in newt.c of newt windowing library (libnewt) 0.50.33 and earlier may allow attackers to cause a denial of service or execute arbitrary code in setuid programs that use libnewt.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =7.2 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =7.1 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =7.2 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =7.1 | |
Red Hat Linux | =7.1 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0506 is classified as a high severity vulnerability due to its potential to cause denial of service or allow arbitrary code execution.
To fix CVE-2002-0506, update to a version of libnewt that is later than 0.50.33.
CVE-2002-0506 affects Red Hat Linux versions 6.2, 7.0, 7.1, and 7.2 on multiple architectures.
CVE-2002-0506 can be exploited to perform a buffer overflow attack in setuid programs using libnewt.
While CVE-2002-0506 is an older vulnerability, it can still pose a threat if affected systems are not properly updated or secured.