First published: Fri Aug 30 2002(Updated: )
Buffer overflow in quot in HP Tru64 UNIX 5.1a, 5.1, 5.0a, 4.0g, and 4.0f allows local users to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HP Tru64 | =4.0g | |
HP Tru64 | =5.0a | |
HP Tru64 | =4.0f | |
HPE HP-UX | =11.11 | |
HP Tru64 | =5.1a | |
HPE HP-UX | =11.04 | |
HPE HP-UX | =11.00 | |
HP Tru64 | =5.1 | |
HPE HP-UX | =11.22 | |
HPE HP-UX | =10.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1611 is classified as a high severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2002-1611, apply the latest patches for HP Tru64 UNIX versions affected by this vulnerability.
CVE-2002-1611 affects HP Tru64 UNIX versions 4.0f, 4.0g, 5.0a, 5.1, and 5.1a.
Local users on affected HP Tru64 UNIX systems are at risk due to the buffer overflow in the quot command.
In the context of CVE-2002-1611, a buffer overflow occurs when a program writes more data to a buffer than it can hold, enabling unauthorized privilege escalation.