A buffer overflow vulnerability is identified in CDE libDtHelp. Because of this, it may be possible for a local attacker to gain elevated privileges. The problem is in the handling of data contained in a certain environment variable. Due to insufficient bounds checking, it is possible that system memory will be corrupted potentially overwriting sensitive values when the environment variable data is copied into memory. A local attacker may exploit this vulnerability in order to execute arbitrary code in the context software that is linked to the vulnerable library.
A buffer overflow vulnerability is identified in CDE libDtHelp. Because of this, it may be possible for a local attacker to gain elevated privileges. The problem is in the handling of data contained in a certain environment variable. Due to insufficient bounds checking, it is possible that system memory will be corrupted potentially overwriting sensitive values when the environment variable data is copied into memory. A local attacker may exploit this vulnerability in order to execute arbitrary code in the context software that is linked to the vulnerable library.