First published: Tue Jun 10 2003(Updated: )
Buffer overflow in Eterm 0.9.2 allows local users to gain privileges via a long ETERMPATH environment variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eterm | =0.9.2 | |
Eterm | =0.9.1 | |
Debian GNU/Linux | =2.3 | |
Debian GNU/Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0382 has a high severity due to the potential for local users to gain elevated privileges.
To fix CVE-2003-0382, update Eterm to version 0.9.3 or later, which addresses the buffer overflow vulnerability.
Eterm versions 0.9.1 and 0.9.2 are affected by CVE-2003-0382.
CVE-2003-0382 cannot be exploited remotely as it requires local access to the system.
CVE-2003-0382 can lead to unauthorized privilege escalation on affected systems.