Linux man -l Format String Vulnerability

BID:2327

Info

Linux man -l Format String Vulnerability

Bugtraq ID: 2327
Class: Input Validation Error
CVE:
Remote: No
Local: Yes
Published: Jan 31 2001 12:00AM
Updated: Jan 31 2001 12:00AM
Credit: This vulnerability was announced to Bugtraq by Joao Gouveia <[email protected]> on January 31, 2001.
Vulnerable: SuSE Linux 7.0
SuSE Linux 6.4
SuSE Linux 6.3
Debian Linux 2.2 sparc
Debian Linux 2.2 powerpc
Debian Linux 2.2 arm
Debian Linux 2.2 alpha
Debian Linux 2.2 68k
Debian Linux 2.2
Not Vulnerable:

Discussion

Linux man -l Format String Vulnerability

man is the manual page viewing program, available with the Linux Operating System in this implementation. It is freely distributed and openly maintained.

A problem with the man command may allow for the elevation of privileges. Due to the handling of format strings by the -l argument of the man command, it may be possible for a local user to pass format strings through the man command, which could allow a user to write to a specific address in the stack and overwrite variables, including the return address of functions on the stack. man, as implemented with some distributions of the Linux operating system, is included as an SUID root binary.

It may be possible for a malicious user with local access to execute arbitrary code on the stack, and potentially gain elevated privileges, including administrative access.

Exploit / POC

Linux man -l Format String Vulnerability

Exploit contributed by Paul Starzetz <[email protected]> .

Solution / Fix

Linux man -l Format String Vulnerability

Solution:
Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.


Debian Linux 2.2 powerpc

Debian Linux 2.2 sparc

Debian Linux 2.2 alpha

Debian Linux 2.2

Debian Linux 2.2 arm

Debian Linux 2.2 68k

References

Linux man -l Format String Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report