Vulnerabilities > CVE-2001-1077 - Buffer Overflow vulnerability in Rxvt 2.6.2
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflow in tt_printf function of rxvt 2.6.2 allows local users to gain privileges via a long (1) -T or (2) -name argument.
Exploit-Db
description | Rxvt 2.6.1/2.6.2 Buffer Overflow Vulnerability. CVE-2001-1077. Local exploit for linux platform |
id | EDB-ID:20928 |
last seen | 2016-02-02 |
modified | 2001-06-15 |
published | 2001-06-15 |
reporter | MasterSecuritY |
source | https://www.exploit-db.com/download/20928/ |
title | Rxvt 2.6.1/2.6.2 - Buffer Overflow Vulnerability |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-062.NASL |
description | Samuel Dralet reported on bugtraq that version 2.6.2 of rxvt (a VT102 terminal emulator for X) have a buffer overflow in thett_printf() function. A local user could abuse this making rxvt print a special string using that function, for example by using the -T or -name command-line options. That string would cause a stack overflow and contain code which rxvt will execute. Since rxvt is installed sgid utmp an attacker could use this to gain utmp which would allow them to modify the utmp file. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14899 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14899 |
title | Debian DSA-062-1 : rxvt - buffer overflow |
code |
|
References
- http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-028-01
- http://www.debian.org/security/2001/dsa-062
- http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-060.php
- http://www.securityfocus.com/archive/1/191510
- http://www.securityfocus.com/bid/2878
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6701