Tridia DoubleVision Local Root Compromise...

- AV AC AU C I A
发布: 2000-09-16
修订: 2025-04-13

A utility integral to Tridia DoubleVision for SCO UnixWare 7.x has been found to be vulnerable to a buffer overflow attack. dvtermtype, which is setuid root, is run by a user at login time to tell DoubleVision what terminal translations to use. The command line parameters are as follows: $ dvtermtype termtype devicename If a malicious user contructs a long termtype string and executes dvtermtype, dvtermtype will stack overflow. This can lead to a root compromise. Tridia has different release schedules for each UNIX platform is supports. It is unclear what other UNIX builds of DoubleVision are vulnerable.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息