First published: Wed Jul 27 2011(Updated: )
opielogin.c in opielogin in OPIE 2.4.1-test1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by arranging for an account to already be running its maximum number of processes.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nrl Opie | =2.3 | |
Nrl Opie | <=2.4.1 | |
Nrl Opie | =2.10 | |
Nrl Opie | =2.2 | |
Nrl Opie | =2.32 | |
Nrl Opie | =2.4 | |
Nrl Opie | =2.21 | |
Nrl Opie | =2.22 | |
Nrl Opie | =2.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.