Vulnerability Description
Buffer overflow in das_watchdog 0.9.0 allows local users to execute arbitrary code with root privileges via a large string in the XAUTHORITY environment variable.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Das Watchdog Project | Das Watchdog | 0.9.0 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2015/dsa-3221
- http://www.openwall.com/lists/oss-security/2015/04/01/8
- http://www.openwall.com/lists/oss-security/2015/04/02/13
- http://www.securityfocus.com/bid/73706
- https://github.com/kmatheussen/das_watchdog/commit/bd20bb02e75e2c0483832b52f2577
- http://www.debian.org/security/2015/dsa-3221
- http://www.openwall.com/lists/oss-security/2015/04/01/8
- http://www.openwall.com/lists/oss-security/2015/04/02/13
- http://www.securityfocus.com/bid/73706
- https://github.com/kmatheussen/das_watchdog/commit/bd20bb02e75e2c0483832b52f2577
FAQ
What is CVE-2015-2831?
CVE-2015-2831 is a vulnerability with a CVSS score of 7.2 (HIGH). Buffer overflow in das_watchdog 0.9.0 allows local users to execute arbitrary code with root privileges via a large string in the XAUTHORITY environment variable.
How severe is CVE-2015-2831?
CVE-2015-2831 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-2831?
Check the references section above for vendor advisories and patch information. Affected products include: Das Watchdog Project Das Watchdog.