First published: Thu Jan 02 2003(Updated: )
Buffer overflow in typespeed 0.4.2 and earlier allows local users to gain privileges via long input.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Typespeed | =0.4.1 | |
Typespeed | =0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1389 is considered to have a critical severity due to the potential for local users to gain elevated privileges.
To fix CVE-2002-1389, users should upgrade Typespeed to version 0.4.3 or later where the vulnerability is patched.
CVE-2002-1389 affects all local users running Typespeed versions 0.4.2 and earlier.
CVE-2002-1389 can be exploited through a buffer overflow attack by providing long input to the application.
While CVE-2002-1389 was disclosed over two decades ago, it remains relevant for outdated systems still using vulnerable versions.