| Vulnerability Name: | CVE-2001-0060 (CCN-5807) | ||||||||
| Assigned: | 2000-12-18 | ||||||||
| Published: | 2000-12-18 | ||||||||
| Updated: | 2018-05-03 | ||||||||
| Summary: | Format string vulnerability in stunnel 3.8 and earlier allows attackers to execute arbitrary commands via a malformed ident username. | ||||||||
| CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
| CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-01:05 stunnel contains potential remote compromise Source: CCN Type: BugTraq Mailing List, Mon Dec 18 2000 - 09:58:29 CST Stunnel format bug Source: BUGTRAQ Type: Patch, Vendor Advisory 20001209 Trustix Security Advisory - stunnel Source: MITRE Type: CNA CVE-2001-0060 Source: CONECTIVA Type: UNKNOWN CLA-2000:363 Source: CCN Type: Conectiva Linux Announcement CLSA-2000:363 stunnel Source: CCN Type: RHSA-2000-137 Updated stunnel packages available for Red Hat Linux 7 Source: DEBIAN Type: UNKNOWN DSA-009 Source: CCN Type: OSVDB ID: 1696 Stunnel syslog() Function Remote Logfile Format String Arbitrary Command Execution Source: REDHAT Type: UNKNOWN RHSA-2000:129 Source: BUGTRAQ Type: Patch, Vendor Advisory 20001218 Stunnel format bug Source: BID Type: Patch, Vendor Advisory 2128 Source: CCN Type: BID-2128 Stunnel Local Arbitrary Command Execution Vulnerability Source: CCN Type: BID-2137 Stunnel Weak Encryption Vulnerability Source: XF Type: UNKNOWN stunnel-format-logfile(5807) Source: XF Type: UNKNOWN stunnel-format-logfile(5807) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||