Home

Description

In UNIX Fourth Research Edition (v4), the su command is vulnerable to a buffer overflow due to the 'password' variable having a fixed size of 100 bytes. A local user can exploit this to gain root privileges. It is unlikely that UNIX v4 is running anywhere outside of a very small number of lab environments.

PUBLISHED Reserved 2026-03-13 | Published 2026-03-13 | Updated 2026-03-13 | Assigner mitre




HIGH: 7.4CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unknown

4 (custom)
affected

References

sigma-star.at/blog/2025/12/unix-v4-buffer-overflow/

www.tuhs.org/pipermail/tuhs/2026-January/032991.html

discuss.systems/@ricci/115747843169814700

www.spinellis.gr/blog/20251223/

cve.org (CVE-2025-71263)

nvd.nist.gov (CVE-2025-71263)

Download JSON