Buffer overflow in iwconfig, when installed setuid, allows local users to execute arbitrary code via a long OUT environment variable.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=106867458902521&w=2 | Exploit Mailing List Third Party Advisory |
http://marc.info/?l=bugtraq&m=106867458902521&w=2 | Exploit Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=106867458902521&w=2 - Exploit, Mailing List, Third Party Advisory |
Information
Published : 2003-12-15 05:00
Updated : 2024-11-20 23:45
NVD link : CVE-2003-0947
Mitre link : CVE-2003-0947
CVE.ORG link : CVE-2003-0947
JSON object : View
Products Affected
wireless_tools_project
- wireless_tools
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')