7.2
CVSSv2

CVE-1999-0906

Published: 23/09/1999 Updated: 09/09/2008
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 726
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in sccw allows local users to gain root access via the HOME environmental variable.

Vulnerable Product Search on Vulmon Subscribe to Product

suse suse linux 6.2

Exploits

source: wwwsecurityfocuscom/bid/656/info A buffer overflow vulnerability in sscw's handling of the HOME environment variable allows local users to gain root privileges #!/bin/bash # # Linux x86 exploit for /usr/bin/sccw on SuSE 62 # # -Brock Tellier btellier@webleycom echo "Building /tmp/sccwxc" cat > /tmp/sccwxc << FO ...

Github Repositories

pytm: A Pythonic framework for threat modeling Introduction Traditional threat modeling too often comes late to the party, or sometimes not at all In addition, creating manual data flows and reports can be extremely time-consuming The goal of pytm is to shift threat modeling to the left, making threat modeling more automated and developer-centric Features Based on your inpu

pytm: A Pythonic framework for threat modeling Introduction Traditional threat modeling too often comes late to the party, or sometimes not at all In addition, creating manual data flows and reports can be extremely time-consuming The goal of pytm is to shift threat modeling to the left, making threat modeling more automated and developer-centric Features Based on your inpu

A Pythonic framework for threat modeling

pytm: A Pythonic framework for threat modeling Introduction Traditional threat modeling too often comes late to the party, or sometimes not at all In addition, creating manual data flows and reports can be extremely time-consuming The goal of pytm is to shift threat modeling to the left, making threat modeling more automated and developer-centric Features Based on your inpu