First published: Wed Jan 02 2002(Updated: )
Buffer overflow in (1) grpck and (2) pwck, if installed setuid on a system as recommended in some AIX documentation, may allow local users to gain privileges via a long command line argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
gRPC | ||
Pwck Pwck |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1594 is classified as a high severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2002-1594, remove the setuid permission on grpck and pwck or apply available patches provided by the vendor.
CVE-2002-1594 affects the grpck and pwck utilities, particularly when they are installed with setuid permissions.
CVE-2002-1594 cannot be exploited remotely as it requires local access to the system to take advantage of the buffer overflow.
A potential workaround for CVE-2002-1594 is to restrict local user access to the vulnerable utilities until a formal fix is applied.