First published: Sat Jan 21 2023(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** A stack-based buffer overflow in ParseColors in libXm in Common Desktop Environment 1.6 can be exploited by local low-privileged users via the dtprintinfo setuid binary to escalate their privileges to root on Solaris 10 systems. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Opengroup Common Desktop Environment | =1.6 | |
=1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24039 is a vulnerability that allows local low-privileged users to escalate their privileges to root on Solaris 10 systems by exploiting a stack-based buffer overflow in ParseColors in libXm in Common Desktop Environment 1.6.
CVE-2023-24039 has a severity rating of 7.8 (high).
CVE-2023-24039 can be exploited by local low-privileged users through the dtprintinfo setuid binary.
CVE-2023-24039 affects Solaris 10 systems with Common Desktop Environment 1.6 installed.
Yes, you can find more information about CVE-2023-24039 at the following links: [Link 1](http://seclists.org/fulldisclosure/2023/Jan/24), [Link 2](https://github.com/0xdea/exploits/blob/master/solaris/raptor_dtprintlibXmas.c), [Link 3](https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt).