4 results (0.014 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

sastcpd in SAS/Base 8.0 might allow local users to gain privileges by setting the netencralg environment variable, which causes a segmentation fault. • http://online.securityfocus.com/archive/1/253183 http://securitytracker.com/id?1003406 http://www.sas.com/service/techsup/unotes/SN/004/004201.html http://www.securityfocus.com/bid/3995 •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

sastcpd in SAS/Base 8.0 allows local users to execute arbitrary code by setting the authprog environment variable to reference a malicious program, which is then executed by sastcpd. • http://online.securityfocus.com/archive/1/253183 http://www.iss.net/security_center/static/8024.php http://www.securityfocus.com/bid/3994 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Format string vulnerability in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via format specifiers in a command line argument. Vulnerabilidad en cadena de formato en SAStcpd en SAS/Base oobjspawn en Sas/Integration Technologies 8.0 y 8.1permite a usuarios locales ejecutar código arbitrario mediante especificadores de formato en un argumento de línea de comandos. • http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0032.html http://online.securityfocus.com/archive/1/252847 http://online.securityfocus.com/archive/1/252891 http://www.iss.net/security_center/static/8018.php http://www.sas.com/service/techsup/unotes/SN/004/004201.html http://www.securityfocus.com/bid/3980 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via large command line argument. Desbordamiento de Buffer en SAS/Base 8.0 y 8.1 oSAS/Integration Technologies 8.0 y 8.1 permite a usuarios locales ejecutar código arbitrario mediante argumentos de linea de comando largos. • http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0032.html http://online.securityfocus.com/archive/1/252847 http://online.securityfocus.com/archive/1/252891 http://www.iss.net/security_center/static/8017.php http://www.sas.com/service/techsup/unotes/SN/004/004201.html http://www.securityfocus.com/bid/3979 •