vendor:
man
by:
Daniel Roethlisberger
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: man
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: CVE-2007-0005
CPE: a:man:man
Metasploit:
https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0005-cve-2009-3885/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0602/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0005-cve-2007-5333/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0005-cve-2007-6286/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2008-0006/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0007/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2008-0004/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2008-0008/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0004/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0006/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0008/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0009/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0005-cve-2007-5342/, https://www.rapid7.com/db/vulnerabilities/vmsa-2008-0005-cve-2007-5618-player/, https://www.rapid7.com/db/vulnerabilities/vmsa-2008-0005-cve-2007-5618-workstation/, https://www.rapid7.com/db/vulnerabilities/vmsa-2010-0005-cve-2007-5461/, https://www.rapid7.com/db/vulnerabilities/vmsa-2008-0005-cve-2007-5269-player/, https://www.rapid7.com/db/vulnerabilities/vmsa-2008-0005-cve-2007-5269-workstation/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0005/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2008-0005/, https://www.rapid7.com/db/?q=CVE-2007-0005&type=&page=2, https://www.rapid7.com/db/?q=CVE-2007-0005&type=&page=2
Platforms Tested: Linux
2007
Local Buffer Overflow in ‘man’ command
The 'man' command is prone to a local buffer-overflow vulnerability because it fails to properly bounds-check user-supplied input before using it in a memory copy operation. Exploiting this issue allows attackers to execute malicious machine code with the privileges of the 'man' utility. This can result in the compromise of affected computers. Failed exploit attempts will likely result in denial-of-service conditions.
Mitigation:
Apply the necessary patches or updates provided by the vendor. Avoid running the 'man' command with elevated privileges.