First published: Fri Aug 01 2003(Updated: )
Heap-based buffer overflow in the name services daemon (nsd) in SGI IRIX 6.5.x through 6.5.21f, and possibly earlier versions, allows attackers to gain root privileges via the AUTH_UNIX gid list.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI IRIX | =6.5.6 | |
SGI IRIX | =6.5.17f | |
SGI IRIX | =6.5.1 | |
SGI IRIX | =6.5.10 | |
SGI IRIX | =6.5.17 | |
SGI IRIX | =6.5.12 | |
SGI IRIX | =6.5.18f | |
SGI IRIX | =6.5.19f | |
SGI IRIX | =6.5.21 | |
SGI IRIX | =6.5 | |
SGI IRIX | =6.5.19m | |
SGI IRIX | =6.5.3 | |
SGI IRIX | =6.5.4 | |
SGI IRIX | =6.5.14 | |
SGI IRIX | =6.5.15 | |
SGI IRIX | =6.5.19 | |
SGI IRIX | =6.5.21f | |
SGI IRIX | =6.5.21m | |
SGI IRIX | =6.5.9 | |
SGI IRIX | =6.5.11 | |
SGI IRIX | =6.5.17m | |
SGI IRIX | =6.5.2 | |
SGI IRIX | =6.5.20 | |
SGI IRIX | =6.5.5 | |
SGI IRIX | =6.5.20f | |
SGI IRIX | =6.5.20m | |
SGI IRIX | =6.5.8 | |
SGI IRIX | =6.5.16 | |
SGI IRIX | =6.5.18m | |
SGI IRIX | =6.5.13 | |
SGI IRIX | =6.5.18 | |
SGI IRIX | =6.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.