First published: Thu Apr 07 2005(Updated: )
Buffer overflow in nwprint in SCO OpenServer 5.0.7 allows local users to execute arbitrary code via a long command line argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xinuos OpenServer | =5.0.7 | |
Xinuos OpenServer | =5.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0993 is classified as a high severity vulnerability due to its potential to allow arbitrary code execution.
To mitigate CVE-2005-0993, users should apply the latest patches provided by Xinuos for their OpenServer installations.
CVE-2005-0993 affects local users of SCO OpenServer versions 5.0.6 and 5.0.7 who can exploit the buffer overflow.
CVE-2005-0993 is a buffer overflow vulnerability that can be triggered by providing a long command line argument.
No, CVE-2005-0993 can only be exploited locally by authenticated users.