Vulnerability Name: | CVE-2001-0700 (CCN-6725) | ||||||||||||
Assigned: | 2001-06-21 | ||||||||||||
Published: | 2001-06-21 | ||||||||||||
Updated: | 2017-10-10 | ||||||||||||
Summary: | Buffer overflow in w3m 0.2.1 and earlier allows a remote attacker to execute arbitrary code via a long base64 encoded MIME header. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-01:46 w3m contains remotely exploitable buffer overflow Source: MITRE Type: CNA CVE-2001-0700 Source: CONECTIVA Type: UNKNOWN CLA-2001:434 Source: CCN Type: Conectiva Linux Announcement CLSA-2001:434 w3m Source: CCN Type: w3m Mailing List - Archive number 2066 w3m Mailing List Source: CONFIRM Type: Patch, Vendor Advisory http://mi.med.tohoku.ac.jp/~satodai/w3m-dev-en/200106.month/537.html Source: DEBIAN Type: UNKNOWN DSA-064 Source: DEBIAN Type: UNKNOWN DSA-081 Source: DEBIAN Type: DSA-064 w3m -- buffer overflow Source: DEBIAN Type: DSA-081 w3m -- Buffer Overflow Source: CCN Type: SNS Advisory No.32 w3m malformed MIME header Buffer Overflow Vulnerability Source: CCN Type: OSVDB ID: 1876 w3m base64 MIME Header Overflow Source: BUGTRAQ Type: UNKNOWN 20010621 [SNS Advisory No.32] w3m malformed MIME header Buffer Overflow Vulnerability Source: BID Type: Exploit, Patch, Vendor Advisory 2895 Source: CCN Type: BID-2895 W3M Malformed MIME Header Buffer Overflow Vulnerability Source: XF Type: UNKNOWN w3m-mime-header-bo(6725) Source: XF Type: UNKNOWN w3m-mime-header-bo(6725) | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |