CVE-2001-0797

Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I
ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/CSSA-2001-SCO.40.txt
http://marc.info/?l=bugtraq&m=100844757228307&w=2
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/213
http://www-1.ibm.com/support/search.wss?rs=0&q=IY26221&apar=only
http://www.cert.org/advisories/CA-2001-34.html Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/569272 US Government Resource
http://www.securityfocus.com/archive/1/246487 Vendor Advisory
http://www.securityfocus.com/bid/3681 Exploit Patch Vendor Advisory
http://xforce.iss.net/alerts/advise105.php Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/7284
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2025
ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I
ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/CSSA-2001-SCO.40.txt
http://marc.info/?l=bugtraq&m=100844757228307&w=2
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/213
http://www-1.ibm.com/support/search.wss?rs=0&q=IY26221&apar=only
http://www.cert.org/advisories/CA-2001-34.html Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/569272 US Government Resource
http://www.securityfocus.com/archive/1/246487 Vendor Advisory
http://www.securityfocus.com/bid/3681 Exploit Patch Vendor Advisory
http://xforce.iss.net/alerts/advise105.php Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/7284
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2025
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:sgi:irix:3.2:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.1:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.3:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0.6a:*:*:*:*:*:*:*
cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*
cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*
cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*
cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*
cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*
cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*

History

20 Nov 2024, 23:36

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I - () ftp://patches.sgi.com/support/free/security/advisories/20011201-01-I -
References () ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/CSSA-2001-SCO.40.txt - () ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/CSSA-2001-SCO.40.txt -
References () http://marc.info/?l=bugtraq&m=100844757228307&w=2 - () http://marc.info/?l=bugtraq&m=100844757228307&w=2 -
References () http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/213 - () http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/213 -
References () http://www-1.ibm.com/support/search.wss?rs=0&q=IY26221&apar=only - () http://www-1.ibm.com/support/search.wss?rs=0&q=IY26221&apar=only -
References () http://www.cert.org/advisories/CA-2001-34.html - Patch, Third Party Advisory, US Government Resource () http://www.cert.org/advisories/CA-2001-34.html - Patch, Third Party Advisory, US Government Resource
References () http://www.kb.cert.org/vuls/id/569272 - US Government Resource () http://www.kb.cert.org/vuls/id/569272 - US Government Resource
References () http://www.securityfocus.com/archive/1/246487 - Vendor Advisory () http://www.securityfocus.com/archive/1/246487 - Vendor Advisory
References () http://www.securityfocus.com/bid/3681 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/3681 - Exploit, Patch, Vendor Advisory
References () http://xforce.iss.net/alerts/advise105.php - Patch, Vendor Advisory () http://xforce.iss.net/alerts/advise105.php - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/7284 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/7284 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2025 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2025 -

Information

Published : 2001-12-12 05:00

Updated : 2024-11-20 23:36


NVD link : CVE-2001-0797

Mitre link : CVE-2001-0797

CVE.ORG link : CVE-2001-0797


JSON object : View

Products Affected

sun

  • sunos
  • solaris

sgi

  • irix

ibm

  • aix

sco

  • openserver

hp

  • hp-ux