7.2
CVSSv2

CVE-2001-1561

Published: 31/12/2001 Updated: 05/09/2008
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in Xvt 2.1 in Debian Linux 2.2 allows local users to execute arbitrary code via long (1) -name and (2) -T arguments.

Vulnerable Product Search on Vulmon Subscribe to Product

john bovey xvt 2.1

debian debian linux 2.2

Vendor Advisories

Christophe Bailleux reported on bugtraq that Xvt is vulnerable to a buffer overflow in its argument handling Since Xvt is installed setuid root, it was possible for a normal user to pass carefully-crafted arguments to xvt so that xvt executed a root shell This problem has been fixed by the maintainer in version 21-13 of xvt for Debian unstable a ...

Exploits

source: wwwsecurityfocuscom/bid/2955/info Xvt is a terminal emulator for systems using X11R6 It is often installed setuid/setgid so that it runs with the enhanced privileges required to log user sessions Xvt contains a buffer overflow in it's handling of the '-name' argument An attacker can exploit this buffer overflow to exploit arb ...