First published: Tue Dec 31 2002(Updated: )
The setitimer(2) system call in OpenBSD 2.0 through 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Openbsd Openbsd | =2.8 | |
Openbsd Openbsd | =3.1 | |
Openbsd Openbsd | =2.9 | |
Openbsd Openbsd | =2.1 | |
Openbsd Openbsd | =2.2 | |
Openbsd Openbsd | =2.0 | |
Openbsd Openbsd | =2.7 | |
Openbsd Openbsd | =2.4 | |
Openbsd Openbsd | =3.0 | |
Openbsd Openbsd | =2.6 | |
Openbsd Openbsd | =2.5 | |
Openbsd Openbsd | =2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.