Impact
The vulnerability is a stack-based buffer overflow triggered by the su command in the UNIX operating system. A password input longer than the 100‑byte limit overruns the stack, allowing an attacker to overwrite return addresses and execute arbitrary code with the privileges of the su command. The result is that a local user can gain root authority on the affected system.
Affected Systems
The affected vendor is AT&T Bell Labs, specifically the UNIX operating system in its Fourth Research Edition. The CVE description explicitly identifies this version as v4 and notes that it is no longer maintained or supported.
Risk and Exploitability
The CVSS score of 7.4 denotes high severity, while an EPSS score of less than 1% indicates that exploitation is unlikely in the wild. The flaw is not listed in the CISA KEV catalog. The likely attack vector is a local user running the su command on a machine still operating UNIX v4. Because no patch exists, the primary risk mitigation is to restrict local access or migrate away from the obsolete platform.
OpenCVE Enrichment