Vulnerability Name:

CVE-2001-0569 (CCN-6952)

Assigned:2001-02-23
Published:2001-02-23
Updated:2008-09-05
Summary:Digital Creations Zope 2.3.1 b1 and earlier contains a problem in the method return values related to the classes (1) ObjectManager, (2) PropertyManager, and (3) PropertySheet.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Data Manipulation
References:Source: MITRE
Type: CNA
CVE-2001-0569

Source: CONECTIVA
Type: UNKNOWN
CLA-2001:382

Source: CCN
Type: Conectiva Linux Announcement CLSA-2001:382
Zope

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-043

Source: DEBIAN
Type: DSA-043
zope -- remote exploit

Source: MANDRAKE
Type: Patch
MDKSA-2001:025

Source: CCN
Type: OSVDB ID: 6286
Zope Class Return Value Modification

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2001:021

Source: CCN
Type: Zope Web site
Software Product: Hotfix_2001-02-23

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.zope.org/Products/Zope/Products/Zope/Products/Zope/Hotfix_2001-02-23

Source: CCN
Type: MandrakeSoft Security Advisory MDKSA-2001:025
Zope

Source: XF
Type: UNKNOWN
zope-classes-return-value(6952)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:zope:zope:*:*:*:*:*:*:*:* (Version <= 2.3.1_b1)

  • Configuration CCN 1:
  • cpe:/a:zope:zope:2.3.1_b1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    zope zope *
    zope zope 2.3.1_b1
    redhat linux 6.2
    debian debian linux 2.2
    mandrakesoft mandrake linux 7.0
    mandrakesoft mandrake linux 7.1
    redhat linux 7
    conectiva linux 6.0
    mandrakesoft mandrake linux corporate server 1.0.1
    redhat linux 7.1
    conectiva linux 4.2
    conectiva linux 5.0
    conectiva linux 5.1
    redhat linux 7.2
    redhat linux 7.3