Vulnerability Description
Buffer overflow in /usr/bin/cu in Solaris 2.8 and earlier, and possibly other operating systems, allows local users to gain privileges by executing cu with a long program name (arg0).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sun | Solaris | 2.6 |
| Sun | Sunos | <= 5.8 |
References
- http://marc.info/?l=bugtraq&m=97983943716311&w=2
- http://marc.info/?l=bugtraq&m=98028642319440&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6224
- http://marc.info/?l=bugtraq&m=97983943716311&w=2
- http://marc.info/?l=bugtraq&m=98028642319440&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6224
FAQ
What is CVE-2001-0190?
CVE-2001-0190 is a vulnerability with a CVSS score of 7.2 (HIGH). Buffer overflow in /usr/bin/cu in Solaris 2.8 and earlier, and possibly other operating systems, allows local users to gain privileges by executing cu with a long program name (arg0).
How severe is CVE-2001-0190?
CVE-2001-0190 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0190?
Check the references section above for vendor advisories and patch information. Affected products include: Sun Solaris, Sun Sunos.