CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
0.4%
Buffer overflow in Linuxconf before 1.28r4 allows local users to execute arbitrary code via a long LINUXCONF_LANG environment variable, which overflows an error string that is generated.
Vendor | Product | Version | CPE |
---|---|---|---|
jacques_gelinas | linuxconf | 1.1.6r10 | cpe:2.3:a:jacques_gelinas:linuxconf:1.1.6r10:*:*:*:*:*:*:* |
jacques_gelinas | linuxconf | 1.1.7 | cpe:2.3:a:jacques_gelinas:linuxconf:1.1.7:*:*:*:*:*:*:* |
jacques_gelinas | linuxconf | 1.1.8 | cpe:2.3:a:jacques_gelinas:linuxconf:1.1.8:*:*:*:*:*:*:* |
jacques_gelinas | linuxconf | 1.1.9r1 | cpe:2.3:a:jacques_gelinas:linuxconf:1.1.9r1:*:*:*:*:*:*:* |
jacques_gelinas | linuxconf | 1.1.9r2 | cpe:2.3:a:jacques_gelinas:linuxconf:1.1.9r2:*:*:*:*:*:*:* |
jacques_gelinas | linuxconf | 1.2 | cpe:2.3:a:jacques_gelinas:linuxconf:1.2:*:*:*:*:*:*:* |
jacques_gelinas | linuxconf | 1.2.1 | cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1:*:*:*:*:*:*:* |
jacques_gelinas | linuxconf | 1.2.1r1 | cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r1:*:*:*:*:*:*:* |
jacques_gelinas | linuxconf | 1.2.1r2 | cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r2:*:*:*:*:*:*:* |
jacques_gelinas | linuxconf | 1.2.1r3 | cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r3:*:*:*:*:*:*:* |