Vulnerability Name: | CVE-2001-0927 (CCN-7608) | ||||||||
Assigned: | 2001-11-27 | ||||||||
Published: | 2001-11-27 | ||||||||
Updated: | 2016-10-18 | ||||||||
Summary: | Format string vulnerability in the permitted function of GNOME libgtop_daemon in libgtop 1.0.12 and earlier allows remote attackers to execute arbitrary code via an argument that contains format specifiers that are passed into the (1) syslog_message and (2) syslog_io_message functions. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: GNOME FTP site pub/GNOME/stable/sources/libgtop/ Source: MISC Type: UNKNOWN ftp://ftp.gnome.org/pub/GNOME/stable/sources/libgtop/libgtop-1.0.13.tar.gz Source: CCN Type: BugTraq Mailing List, Tue Nov 27 2001 - 01:07:48 CST [CERT-intexxia] libgtop_daemon Remote Format String Vulnerability Source: MITRE Type: CNA CVE-2001-0927 Source: BUGTRAQ Type: UNKNOWN 20011127 [CERT-intexxia] libgtop_daemon Remote Format String Vulnerability Source: DEBIAN Type: Patch, Vendor Advisory DSA-098 Source: DEBIAN Type: DSA-098 libgtop -- format string vulnerability and buffer overflow Source: CCN Type: OSVDB ID: 13993 GNOME libgtop permitted Function Format String Source: CCN Type: BID-3586 GNOME libgtop_daemon Remote Format String Vulnerability Source: XF Type: UNKNOWN libgtop-format-string(7608) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |