Multiple buffer overflows in Options Parsing Tool (OPT) shared library 3.18 and earlier, when used in setuid programs, may allow local users to execute arbitrary code via long command line options that are fed into macros such as opt_warn_2, as used in functions such as opt_atoi.
References
Configurations
History
20 Nov 2024, 23:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=105121918523320&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=105371246204866&w=2 - | |
References | () http://nis-www.lanl.gov/~jt/Software/opt/opt-3.19.tar.gz - Patch |
Information
Published : 2003-07-02 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2003-0390
Mitre link : CVE-2003-0390
CVE.ORG link : CVE-2003-0390
JSON object : View
Products Affected
james_theiler
- opt
CWE