https://www.exploit-db.com/exploits/20926
Linux Man Page 6.1/6.2/7.0/7.1- Source Buffer Overflow






漏洞ID | 1053537 | 漏洞类型 | |
发布时间 | 2001-06-12 | 更新时间 | 2001-06-12 |
![]() |
N/A | ![]() |
N/A |
漏洞平台 | Linux | CVSS评分 | N/A |
|漏洞来源
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/2872/info
A buffer overflow vulnerability exists in the implementation of the 'man' system manual pager program commonly included with Linux distributions.
The vulnerability exists due to the way the program handles manual page files beginning with a '.so' statement. Under certain circumstances, the code responsible for processing this data may be allow the length of the filename from a '.so' statement to be expanded, eventually causing a boundary condition error.
As a result, it may be possible for local users to execute arbitrary code with group 'man' privileges.
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/20926.tar.gz
检索漏洞
开始时间
结束时间