Vulnerability Name: | CVE-2001-0763 (CCN-6670) | ||||||||
Assigned: | 2001-06-08 | ||||||||
Published: | 2001-06-08 | ||||||||
Updated: | 2018-05-03 | ||||||||
Summary: | Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: BUGTRAQ Type: Vendor Advisory 20010608 potential buffer overflow in xinetd-2.1.8.9pre11-1 Source: CCN Type: BugTraq Mailing List, Fri Jun 08 2001 - 09:10:41 CDT potential buffer overflow in xinetd-2.1.8.9pre11-1 Source: MITRE Type: CNA CVE-2001-0763 Source: CONECTIVA Type: UNKNOWN CLA-2001:404 Source: CCN Type: Conectiva Linux Announcement CLSA-2001:404 xinetd Source: IMMUNIX Type: UNKNOWN IMNX-2001-70-024-01 Source: CCN Type: Immunix OS Security Advisory IMNX-2001-70-029-01 xinetd Source: CCN Type: RHSA-2001-075 Updated xinetd package available for Red Hat Linux 7 and 7.1 Source: CCN Type: CIAC Information Bulletin L-104 SuSE Linux, xinetd Buffer Overflow Source: CIAC Type: UNKNOWN L-104 Source: DEBIAN Type: Patch, Vendor Advisory DSA-063 Source: DEBIAN Type: DSA-063 xinetd -- change default umask Source: ENGARDE Type: UNKNOWN ESA-20010621-01 Source: CCN Type: EnGarde Secure Linux Security Advisory ESA-20010621-01 xinetd Source: CCN Type: OSVDB ID: 5542 xinetd Long Ident Response Overflow Source: REDHAT Type: UNKNOWN RHSA-2001:075 Source: BID Type: UNKNOWN 2840 Source: CCN Type: BID-2840 Xinetd Buffer Overflow Vulnerability Source: CCN Type: SuSE Security Announcement SuSE-SA:2001:022 xinetd Source: XF Type: UNKNOWN xinetd-identd-bo(6670) Source: XF Type: UNKNOWN xinetd-identd-bo(6670) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |