A stack-based buffer overflow in ParseColors in libXm in Common Desktop Environment 1.6 can be exploited by local low-privileged users via the dtprintinfo setuid binary to escalate their privileges to root on Solaris 10 systems. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2023/Jan/24 | Mailing List Third Party Advisory |
https://github.com/0xdea/exploits/blob/master/solaris/raptor_dtprintlibXmas.c | Third Party Advisory |
https://github.com/hnsecurity/vulns/blob/main/HNS-2022-01-dtprintinfo.txt | Third Party Advisory |
https://security.humanativaspa.it/nothing-new-under-the-sun/ | Exploit Third Party Advisory |
Configurations
History
07 Nov 2023, 04:08
Type | Values Removed | Values Added |
---|---|---|
Summary | A stack-based buffer overflow in ParseColors in libXm in Common Desktop Environment 1.6 can be exploited by local low-privileged users via the dtprintinfo setuid binary to escalate their privileges to root on Solaris 10 systems. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. |
Information
Published : 2023-01-21 02:15
Updated : 2024-08-02 11:16
NVD link : CVE-2023-24039
Mitre link : CVE-2023-24039
CVE.ORG link : CVE-2023-24039
JSON object : View
Products Affected
opengroup
- common_desktop_environment
CWE
CWE-787
Out-of-bounds Write