Last Modified: Dec. 19, 2017
Buffer overflow in the GNU DataDisplay Debugger (DDD) 3.3.1 allows local users to execute arbitrary code and possibly gain privileges via a long HOME environment variable. NOTE: since DDD is not installed setuid or setgid, perhaps this issue should not be included in CVE.
Access Vector: Local
Access Complexity: Low
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete
Base Score: 7.2
Exploitability Score: 3.9
Impact Score: 10.0
CVSS V2: AV:L/AC:L/Au:N/C:C/I:C/A:C
NVD-CWE-Other
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:gnu:data_display_debugger:3.3.1:*:*:*:*:*:*:* Part: a Vendor: gnu | Alle Schwachstellen für gnu |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:gnu:data_display_debugger:3.3.1:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="local"/> </set>
<?xml version="1.0" ?> <set operator="and"> <prop key="target" value="host"/> <set operator="or"> <prop key="program_influence" value="input"/> <prop key="program_influence" value="output"/> <prop key="program_influence" value="existence"/> </set> <prop key="data" value="any"/> <set operator="or"> <prop key="data_influence" value="read"/> <prop key="data_influence" value="write"/> <prop key="data_influence" value="delete"/> </set> <set operator="or"> <prop key="range" value="local"/> <prop key="range" value="local"/> </set> </set>