Vulnerability Name: | CVE-2001-0928 (CCN-7635) | ||||||||||||
Assigned: | 2001-11-28 | ||||||||||||
Published: | 2001-11-28 | ||||||||||||
Updated: | 2016-10-18 | ||||||||||||
Summary: | Buffer overflow in the permitted function of GNOME gtop daemon (libgtop_daemon) in libgtop 1.0.13 and earlier may allow remote attackers to execute arbitrary code via long authentication data. | ||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: CCN Type: GNOME FTP site pub/GNOME/stable/sources/libgtop/ Source: CCN Type: BugTraq Mailing List, Wed Nov 28 2001 - 04:52:27 CST Re: [CERT-intexxia] libgtop_daemon Remote Format String Vulnerability Source: MITRE Type: CNA CVE-2001-0928 Source: BUGTRAQ Type: UNKNOWN 20011128 Re: [CERT-intexxia] libgtop_daemon Remote Format String Vulnerability Source: DEBIAN Type: Patch, Vendor Advisory DSA-098 Source: DEBIAN Type: Patch, Vendor Advisory DSA-301 Source: DEBIAN Type: DSA-098 libgtop -- format string vulnerability and buffer overflow Source: DEBIAN Type: DSA-301 libgtop -- buffer overflow Source: CCN Type: US-CERT VU#705771 gtop daemon contains buffer overflow Source: CERT-VN Type: Third Party Advisory, US Government Resource VU#705771 Source: CCN Type: OSVDB ID: 13994 GNOME libgtop permitted Function Authentication Data Overflow Source: BID Type: UNKNOWN 3594 Source: CCN Type: BID-3594 GNOME libgtop_daemon Remote Buffer Overflow Vulnerability Source: XF Type: UNKNOWN libgtop-permitted-bo(7635) | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |