7.2
CVSSv2

CVE-2001-0459

Published: 27/06/2001 Updated: 19/12/2017
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 730
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflows in ascdc Afterstep while running setuid allows local users to gain root privileges via a long (1) -d option, (2) -m option, or (3) -f option.

Vulnerable Product Search on Vulmon Subscribe to Product

afterstep.org afterstep

rob malda ascdc 0.3

Exploits

/* source: wwwsecurityfocuscom/bid/2462/info ascdc is a program written for X by Rob Malda It is designed to provide a graphical interface to cd changing on linux systems A vulnerability in the program could allow elevated privileges on a system with the package installed setuid Due to insufficent bounds checking, it is possible to ex ...
source: wwwsecurityfocuscom/bid/2462/info ascdc is a program written for X by Rob Malda It is designed to provide a graphical interface to cd changing on linux systems A vulnerability in the program could allow elevated privileges on a system with the package installed setuid Due to insufficent bounds checking, it is possible to exe ...