Andries Brouwer » MAN : Security Vulnerabilities, CVEs,
man-db 2.3.12 and 2.3.18 to 2.4.1 uses certain user-controlled DEFINE directives from the ~/.manpath file, even when running setuid, which could allow local users to gain privileges.
Max CVSS
4.6
EPSS Score
0.04%
Published
2003-08-27
Updated
2017-07-11
Multiple buffer overflows in man-db 2.4.1 and earlier, when installed setuid, allow local users to gain privileges via (1) MANDATORY_MANPATH, MANPATH_MAP, and MANDB_MAP arguments to add_to_dirlist in manp.c, (2) a long pathname to ult_src in ult_src.c, (3) a long .so argument to test_for_include in ult_src.c, (4) a long MANPATH environment variable, or (5) a long PATH environment variable.
Max CVSS
4.6
EPSS Score
0.04%
Published
2003-08-27
Updated
2016-10-18
man before 1.5l allows attackers to execute arbitrary code via a malformed man file with improper quotes, which causes the my_xsprintf function to return a string with the value "unsafe," which is then executed as a program via a system call if it is in the search path of the user who runs man.
Max CVSS
4.6
EPSS Score
0.21%
Published
2003-03-18
Updated
2017-10-10
3 vulnerabilities found