CVE-2005-1394
Summary
| CVE | CVE-2005-1394 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-05-03 04:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | Format string vulnerability in ArcGIS for ESRI ArcInfo Workstation 9.0 allows local users to gain privileges via format string specifiers in the ARCHOME environment variable to (1) wservice or (2) lockmgr. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:L/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Esri | Arcinfo Workstation | 9.0 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Secunia - Advisories - ArcInfo Workstation Format String and Buffer Overflow Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Broken Link |
| ArcGIS Buffer Overflows and Format String Errors Let Local Users Gain Root Privilegges - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | Broken Link, Patch, Third Party Advisory, VDB Entry, Vendor Advisory |
| Patches and Service Packs - ESRI Support | af854a3a-2127-422b-91ae-364da2661108 | support.esri.com | Vendor Advisory |
| www.digitalmunition.com/DMA%5B2005-0425a%5D.txt | af854a3a-2127-422b-91ae-364da2661108 | www.digitalmunition.com | Patch, Third Party Advisory |
| marc.info | af854a3a-2127-422b-91ae-364da2661108 | marc.info | Mailing List, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.