First published: Thu Nov 06 2003(Updated: )
Buffer overflow in CDE libDtHelp library allows local users to execute arbitrary code via (1) a modified DTHELPUSERSEARCHPATH environment variable and the Help feature, (2) DTSEARCHPATH, or (3) LOGNAME.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
UNIX | =8.0 | |
Xinuos UnixWare | =7.1.1 | |
Xinuos UnixWare | =7.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0834 is classified as a critical vulnerability due to its ability to allow local users to execute arbitrary code.
To fix CVE-2003-0834, update your system to the latest patched version provided by the software vendor.
CVE-2003-0834 affects SCO Open UNIX 8.0 and Xinuos UnixWare versions 7.1.1 and 7.1.3.
The attack vector for CVE-2003-0834 involves manipulating the DTHELPUSERSEARCHPATH, DTSEARCHPATH, or LOGNAME environment variables.
Exploitation of CVE-2003-0834 could lead to unauthorized local code execution, putting the system at significant risk.