Vulnerabilities > CVE-2001-1561 - Buffer Overflow vulnerability in Xvt
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Buffer overflow in Xvt 2.1 in Debian Linux 2.2 allows local users to execute arbitrary code via long (1) -name and (2) -T arguments.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
OS | 1 |
Exploit-Db
description | Xvt 2.1 Buffer Overflow Vulnerability. CVE-2001-1561. Local exploit for linux platform |
id | EDB-ID:20986 |
last seen | 2016-02-02 |
modified | 2001-07-02 |
published | 2001-07-02 |
reporter | Christophe Bailleux |
source | https://www.exploit-db.com/download/20986/ |
title | Xvt 2.1 - Buffer Overflow Vulnerability |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-082.NASL |
description | Christophe Bailleux reported on bugtraq that Xvt is vulnerable to a buffer overflow in its argument handling. Since Xvt is installed setuid root, it was possible for a normal user to pass carefully-crafted arguments to xvt so that xvt executed a root shell. This problem has been fixed by the maintainer in version 2.1-13 of xvt for Debian unstable and 2.1-13.0potato.1 for the stable Debian GNU/Linux 2.2. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14919 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14919 |
title | Debian DSA-082-1 : xvt - Buffer Overflow |
code |
|