First published: Tue Dec 31 2002(Updated: )
Multiple buffer overflows in HP Tru64 UNIX 5.x allow local users to execute arbitrary code via (1) a long -contextDir argument to dtaction, (2) a long -p argument to dtprintinfo, (3) a long -customization argument to dxterm, or (4) a long DISPLAY environment variable to dtterm.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HP Tru64 UNIX | =5.1b_pk2_bl22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1617 has a high severity due to multiple buffer overflow vulnerabilities that can lead to arbitrary code execution.
To fix CVE-2002-1617, it is recommended to apply software patches provided by HP for the affected Tru64 UNIX 5.x version.
CVE-2002-1617 affects HP Tru64 UNIX versions 5.1b_pk2_bl22 and possibly other versions within the 5.x release.
Local users of affected HP Tru64 UNIX systems are at risk from CVE-2002-1617 due to the buffer overflow vulnerabilities.
CVE-2002-1617 can be exploited through various methods, including passing long arguments to specific commands like dtaction and dtprintinfo.