First published: Tue Oct 25 2005(Updated: )
Stack-based buffer overflow in ppp in SCO Unixware 7.1.3 and 7.1.4, and possibly earlier versions, allows local users to execute arbitrary code via a long argument to the (1) prompt or (2) defprompt command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xinuos UnixWare | =7.1.3 | |
Xinuos UnixWare | =7.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2927 is classified as a high severity vulnerability due to its potential for local users to execute arbitrary code.
To fix CVE-2005-2927, update SCO Unixware to the latest patched version that addresses this buffer overflow issue.
The affected users are those running SCO Unixware versions 7.1.3 and 7.1.4, as well as possibly earlier versions.
CVE-2005-2927 is a stack-based buffer overflow vulnerability found in the ppp component of SCO Unixware.
No, CVE-2005-2927 can only be exploited by local users with access to the affected system.