{ "id": "CVE-1999-1182", "sourceIdentifier": "cve@mitre.org", "published": "1997-07-17T04:00:00.000", "lastModified": "2016-10-18T02:01:59.543", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 7.2 }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:delix:dld:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "8B149610-0B27-4CE2-8A2E-D460529B524F" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:caldera:openlinux_lite:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "183C974A-3C40-4DB0-8883-76C589873422" }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:lst:lst_power_linux:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "DABB88D7-AF77-4460-B5FD-23CB2CDE280D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9092D88-585D-4A0C-B181-E8D93563C74B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "D8211154-6685-4FF0-B3ED-43A5E5763A10" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F299301C-6BFC-436C-9CFD-2E291D3702AE" }, { "vulnerable": true, "criteria": "cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "830D48B8-D21D-4D31-99A1-20C231804DBE" } ] } ] } ], "references": [ { "url": "http://marc.info/?l=bugtraq&m=87602661419318&w=2", "source": "cve@mitre.org" }, { "url": "http://marc.info/?l=bugtraq&m=87602661419351&w=2", "source": "cve@mitre.org" }, { "url": "http://marc.info/?l=bugtraq&m=88661732807795&w=2", "source": "cve@mitre.org" } ] }