Vulnerability Name: | CVE-2001-0779 (CCN-6629) | ||||||||||||
Assigned: | 2001-05-28 | ||||||||||||
Published: | 2001-05-28 | ||||||||||||
Updated: | 2018-10-30 | ||||||||||||
Summary: | Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username. | ||||||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CCN Type: Caldera International, Inc. Security Advisory CSSA-2002-SCO.19 OpenServer 5.0.5 OpenServer 5.0.6 : yppasswdd remotely exploitable buffer overflow Source: CCN Type: BugTraq Mailing List, Mon May 28 2001 - 13:14:23 CDT solaris 2.6, 7 yppasswd vulnerability Source: CCN Type: BugTraq Mailing List, Wed May 30 2001 - 22:49:30 CDT Re: solaris 2.6, 7 yppasswd vulnerability Source: MITRE Type: CNA CVE-2001-0779 Source: SUN Type: UNKNOWN 00209 Source: CCN Type: Sun Microsystems, Inc. Security Bulletin #00209 rpc.yppasswdd Source: CCN Type: Sun Microsystems, Inc. Web site SunSolve Patch Access Source: CCN Type: CIAC Information Bulletin M-008 Sun rpc.yppasswdd Security Vulnerability Source: CIAC Type: UNKNOWN M-008 Source: CCN Type: SANS Emergency Incident Handler May 29, 2001 Solaris yppassword buffer overflow Source: CCN Type: US-CERT VU#327281 Solaris rpc.yppasswdd does not adequately check input allowing users to execute arbitrary code Source: CERT-VN Type: US Government Resource VU#327281 Source: CCN Type: OSVDB ID: 20237 IBM AIX rpc.yppasswdd Long String Overflow Source: CCN Type: OSVDB ID: 567 Solaris rpc.yppasswdd username Remote Overflow Source: BUGTRAQ Type: Exploit, Patch, Vendor Advisory 20010528 solaris 2.6, 7 yppasswd vulnerability Source: BUGTRAQ Type: Patch, Vendor Advisory 20011004 Patches for Solaris rpc.yppasswdd available Source: BID Type: Exploit, Patch, Vendor Advisory 2763 Source: CCN Type: BID-2763 Multiple Vendor rpc.yppasswdd Buffer Overrun Vulnerability Source: XF Type: UNKNOWN solaris-yppasswd-bo(6629) Source: XF Type: UNKNOWN solaris-yppasswd-bo(6629) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:102 Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:56 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |