Linux Man Page 6.1/6.2/7.0/7.1- Source Buffer Overflow

Author: zen-parse
type: local
platform: linux
port: 
date_added: 2001-06-12  
date_updated: 2012-09-02  
verified: 1  
codes: OSVDB-88579  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 20926.txt  
source: https://www.securityfocus.com/bid/2872/info

A buffer overflow vulnerability exists in the implementation of the 'man' system manual pager program commonly included with Linux distributions.

The vulnerability exists due to the way the program handles manual page files beginning with a '.so' statement. Under certain circumstances, the code responsible for processing this data may be allow the length of the filename from a '.so' statement to be expanded, eventually causing a boundary condition error.

As a result, it may be possible for local users to execute arbitrary code with group 'man' privileges.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20926.tar.gz