Action not permitted
Modal body text goes here.
CVE-2001-0317
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:14:07.393Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2001:013", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-013.html" }, { "name": "linux-ptrace-modify-process(6080)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6080" }, { "name": "CSSA-2001-009", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-009.0.txt" }, { "name": "20010213 Trustix Security Advisory - proftpd, kernel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0267.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2001:013", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2001-013.html" }, { "name": "linux-ptrace-modify-process(6080)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6080" }, { "name": "CSSA-2001-009", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-009.0.txt" }, { "name": "20010213 Trustix Security Advisory - proftpd, kernel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0267.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0317", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2001:013", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2001-013.html" }, { "name": "linux-ptrace-modify-process(6080)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6080" }, { "name": "CSSA-2001-009", "refsource": "CALDERA", "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-009.0.txt" }, { "name": "20010213 Trustix Security Advisory - proftpd, kernel", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0267.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0317", "datePublished": "2001-05-07T04:00:00", "dateReserved": "2001-04-04T00:00:00", "dateUpdated": "2024-08-08T04:14:07.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2001-0317\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2001-05-03T04:00:00.000\",\"lastModified\":\"2017-10-10T01:29:40.687\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:H/Au:N/C:P/I:P/A:P\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":3.7},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":1.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"146F7A77-A950-4CAD-BDA9-C239696F569D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24A129D-2E5E-436C-95DE-AE75D2E8D092\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2001-02/0267.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.caldera.com/support/security/advisories/CSSA-2001-009.0.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2001-013.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/6080\",\"source\":\"cve@mitre.org\"}]}}" } }
gsd-2001-0317
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2001-0317", "description": "Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process.", "id": "GSD-2001-0317", "references": [ "https://access.redhat.com/errata/RHSA-2001:013" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2001-0317" ], "details": "Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process.", "id": "GSD-2001-0317", "modified": "2023-12-13T01:19:01.190325Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0317", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2001:013", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2001-013.html" }, { "name": "linux-ptrace-modify-process(6080)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6080" }, { "name": "CSSA-2001-009", "refsource": "CALDERA", "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-009.0.txt" }, { "name": "20010213 Trustix Security Advisory - proftpd, kernel", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0267.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0317" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "20010213 Trustix Security Advisory - proftpd, kernel", "refsource": "BUGTRAQ", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0267.html" }, { "name": "CSSA-2001-009", "refsource": "CALDERA", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-009.0.txt" }, { "name": "RHSA-2001:013", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2001-013.html" }, { "name": "linux-ptrace-modify-process(6080)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6080" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-10T01:29Z", "publishedDate": "2001-05-03T04:00Z" } } }
var-200105-0064
Vulnerability from variot
Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process. Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. There is a remote integer overflow vulnerability in several implementations of the SSH1 protocol that allows an attacker to execute arbitrary code with the privileges of the SSH daemon, typically root. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root. Secure Shell, or SSH, is an encrypted remote access protocol. SSH or code based on SSH is used by many systems all over the world and in a wide variety of commercial applications. An integer-overflow bug in the CRC32 compensation attack detection code may allow remote attackers to write values to arbitrary locations in memory. This would occur in situations where large SSH packets are recieved by either a client or server, and a 32 bit representation of the SSH packet length is assigned to a 16 bit integer. The difference in data representation in these situations will cause the 16 bit variable to be assigned to zero (or a really low value). As a result, future calls to malloc() as well as an index used to reference locations in memory can be corrupted by an attacker. This could occur in a manner that can be exploited to write certain numerical values to almost arbitrary locations in memory. UPDATE: There have been reports suggesting that exploitation of this vulnerability may be widespread. Since early september, independent, reliable sources have confirmed that this vulnerability is being exploited by attackers on the Internet. Security Focus does not currently have the exploit code being used, however this record will be updated if and when it becomes available. NOTE: Cisco 11000 Content Service Switch family is vulnerable to this issue. All WebNS releases prior, but excluding, versions: 4.01 B42s, 4.10 22s, 5.0 B11s, 5.01 B6s, are vulnerable. Secure Computing SafeWord Agent for SSH is reportedly prone to this issue, as it is based on a vulnerable version of SSH. ** NetScreen ScreenOS is not directly vulnerable to this issue, however the referenced exploit will cause devices using vulnerable versions of the software to stop functioning properly. This will result in a denial of service condition for NetScreen devices. This issue is in the Secure Command Shell (SCS) administrative interface, which is an implementation of SSHv1. SCS is not enabled on NetScreen devices by default. Cisco has reported that scanning for SSH vulnerabilities on affected devices will cause excessive CPU consumption. The condition is due to a failure of the Cisco SSH implementation to properly process large SSH packets. As many of these devices are critical infrastructure components, more serious network outages may occur. Cisco has released upgrades that will eliminate this vulnerability. An expired public key could cause GPG to fail the encryption of an outgoing message, without any error message or warning being delivered to the user. As a result, the user could transmit data, meant to be encrypted, as plaintext. TO UNSUBSCRIBE: email "unsubscribe alert" in the body of your message to majordomo@iss.net Contact alert-owner@iss.net for help with any problems!
-----BEGIN PGP SIGNED MESSAGE-----
ISS X-Force has received reports that some individuals were unable to verify the PGP signature on the Security Alert Summary distributed earlier in the week. Due to this issue, X-Force is re-distributing the Security Alert Summary. We apologize for any inconvience this may have caused.
Internet Security Systems Security Alert Summary March 5, 2001 Volume 6 Number 4
X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To receive these Alert Summaries as well as other Alerts and Advisories, subscribe to the Internet Security Systems Alert mailing list at: http://xforce.iss.net/maillists/index.php
This summary can be found at http://xforce.iss.net/alerts/vol-6_num-4.php
Contents
90 Reported Vulnerabilities
Risk Factor Key
Date Reported: 2/27/01 Vulnerability: a1-server-dos Platforms Affected: A1 Server Risk Factor: Medium Attack Type: Network Based Brief Description: A1 Server denial of service X-Force URL: http://xforce.iss.net/static/6161.php
Date Reported: 2/27/01 Vulnerability: a1-server-directory-traversal Platforms Affected: A1 Server Risk Factor: Medium Attack Type: Network Based Brief Description: A1 Server directory traversal X-Force URL: http://xforce.iss.net/static/6162.php
Date Reported: 2/27/01 Vulnerability: webreflex-web-server-dos Platforms Affected: WebReflex Risk Factor: Medium Attack Type: Network Based Brief Description: WebReflex Web server denial of service X-Force URL: http://xforce.iss.net/static/6163.php
Date Reported: 2/26/01 Vulnerability: sudo-bo-elevate-privileges Platforms Affected: Sudo Risk Factor: Medium Attack Type: Host Based Brief Description: Sudo buffer overflow could allow elevated user privileges X-Force URL: http://xforce.iss.net/static/6153.php
Date Reported: 2/26/01 Vulnerability: mygetright-skin-overwrite-file Platforms Affected: My GetRight Risk Factor: High Attack Type: Network Based Brief Description: My GetRight 'skin' allows remote attacker to overwrite existing files X-Force URL: http://xforce.iss.net/static/6155.php
Date Reported: 2/26/01 Vulnerability: mygetright-directory-traversal Platforms Affected: My GetRight Risk Factor: Medium Attack Type: Network Based Brief Description: My GetRight directory traversal X-Force URL: http://xforce.iss.net/static/6156.php
Date Reported: 2/26/01 Vulnerability: win2k-event-viewer-bo Platforms Affected: Windows 2000 Risk Factor: once-only Attack Type: Host Based Brief Description: Windows 2000 event viewer buffer overflow X-Force URL: http://xforce.iss.net/static/6160.php
Date Reported: 2/26/01 Vulnerability: netscape-collabra-cpu-dos Platforms Affected: Netscape Risk Factor: Medium Attack Type: Network Based Brief Description: Netscape Collabra CPU denial of service X-Force URL: http://xforce.iss.net/static/6159.php
Date Reported: 2/26/01 Vulnerability: netscape-collabra-kernel-dos Platforms Affected: Netscape Risk Factor: Medium Attack Type: Network Based Brief Description: Netscape Collabra Server kernel denial of service X-Force URL: http://xforce.iss.net/static/6158.php
Date Reported: 2/23/01 Vulnerability: mercur-expn-bo Platforms Affected: MERCUR Risk Factor: High Attack Type: Network Based Brief Description: MERCUR Mailserver EXPN buffer overflow X-Force URL: http://xforce.iss.net/static/6149.php
Date Reported: 2/23/01 Vulnerability: sedum-http-dos Platforms Affected: SEDUM Risk Factor: Medium Attack Type: Network Based Brief Description: SEDUM HTTP server denial of service X-Force URL: http://xforce.iss.net/static/6152.php
Date Reported: 2/23/01 Vulnerability: tru64-inetd-dos Platforms Affected: Tru64 Risk Factor: Medium Attack Type: Host Based Brief Description: Tru64 UNIX inetd denial of service X-Force URL: http://xforce.iss.net/static/6157.php
Date Reported: 2/22/01 Vulnerability: outlook-vcard-bo Platforms Affected: Microsoft Outlook Risk Factor: High Attack Type: Host Based Brief Description: Outlook and Outlook Express vCards buffer overflow X-Force URL: http://xforce.iss.net/static/6145.php
Date Reported: 2/22/01 Vulnerability: ultimatebb-cookie-member-number Platforms Affected: Ultimate Bulletin Board Risk Factor: High Attack Type: Network Based Brief Description: Ultimate Bulletin Board cookie allows attacker to change member number X-Force URL: http://xforce.iss.net/static/6144.php
Date Reported: 2/21/01 Vulnerability: ultimatebb-cookie-gain-privileges Platforms Affected: Ultimate Bulletin Board Risk Factor: Medium Attack Type: Network Based Brief Description: Ultimate Bulletin Board allows remote attacker to obtain cookie information X-Force URL: http://xforce.iss.net/static/6142.php
Date Reported: 2/21/01 Vulnerability: sendmail-elevate-privileges Platforms Affected: Sendmail Risk Factor: High Attack Type: Host Based Brief Description: Sendmail -bt command could allow the elevation of privileges X-Force URL: http://xforce.iss.net/static/6147.php
Date Reported: 2/21/01 Vulnerability: jre-jdk-execute-commands Platforms Affected: JRE/JDK Risk Factor: High Attack Type: Host Based Brief Description: JRE/JDK could allow unauthorized execution of commands X-Force URL: http://xforce.iss.net/static/6143.php
Date Reported: 2/20/01 Vulnerability: licq-remote-port-dos Platforms Affected: LICQ Risk Factor: Medium Attack Type: Network Based Brief Description: LICQ remote denial of service X-Force URL: http://xforce.iss.net/static/6134.php
Date Reported: 2/20/01 Vulnerability: pgp4pine-expired-keys Platforms Affected: pgp4pine Risk Factor: Medium Attack Type: Host Based Brief Description: pgp4pine may transmit messages using expired public keys X-Force URL: http://xforce.iss.net/static/6135.php
Date Reported: 2/20/01 Vulnerability: chilisoft-asp-view-files Platforms Affected: Chili!Soft ASP Risk Factor: High Attack Type: Network Based Brief Description: Chili!Soft ASP allows remote attackers to gain access to sensitive information X-Force URL: http://xforce.iss.net/static/6137.php
Date Reported: 2/20/01 Vulnerability: win2k-domain-controller-dos Platforms Affected: Windows 2000 Risk Factor: once-only Attack Type: Network/Host Based Brief Description: Windows 2000 domain controller denial of service X-Force URL: http://xforce.iss.net/static/6136.php
Date Reported: 2/19/01 Vulnerability: asx-remote-dos Platforms Affected: ASX Switches Risk Factor: Medium Attack Type: Network Based Brief Description: ASX switches allow remote denial of service X-Force URL: http://xforce.iss.net/static/6133.php
Date Reported: 2/18/01 Vulnerability: http-cgi-mailnews-username Platforms Affected: Mailnews.cgi Risk Factor: High Attack Type: Network Based Brief Description: Mailnews.cgi allows remote attacker to execute shell commands using username X-Force URL: http://xforce.iss.net/static/6139.php
Date Reported: 2/17/01 Vulnerability: badblue-ext-reveal-path Platforms Affected: BadBlue Risk Factor: Low Attack Type: Network Based Brief Description: BadBlue ext.dll library reveals path X-Force URL: http://xforce.iss.net/static/6130.php
Date Reported: 2/17/01 Vulnerability: badblue-ext-dos Platforms Affected: BadBlue Risk Factor: Medium Attack Type: Network Based Brief Description: BadBlue ext.dll library denial of service X-Force URL: http://xforce.iss.net/static/6131.php
Date Reported: 2/17/01 Vulnerability: moby-netsuite-bo Platforms Affected: Moby's NetSuite Risk Factor: Medium Attack Type: Network Based Brief Description: Moby's NetSuite Web server buffer overflow X-Force URL: http://xforce.iss.net/static/6132.php
Date Reported: 2/16/01 Vulnerability: webactive-directory-traversal Platforms Affected: WEBactive Risk Factor: Medium Attack Type: Network/Host Based Brief Description: WEBactive HTTP Server directory traversal X-Force URL: http://xforce.iss.net/static/6121.php
Date Reported: 2/16/01 Vulnerability: esone-cgi-directory-traversal Platforms Affected: ES.One store.cgi Risk Factor: Medium Attack Type: Network Based Brief Description: Thinking Arts ES.One store.cgi directory traversal X-Force URL: http://xforce.iss.net/static/6124.php
Date Reported: 2/16/01 Vulnerability: vshell-username-bo Platforms Affected: VShell Risk Factor: High Attack Type: Network Based Brief Description: VShell username buffer overflow X-Force URL: http://xforce.iss.net/static/6146.php
Date Reported: 2/16/01 Vulnerability: vshell-port-forwarding-rule Platforms Affected: VShell Risk Factor: Medium Attack Type: Network/Host Based Brief Description: VShell uses weak port forwarding rule X-Force URL: http://xforce.iss.net/static/6148.php
Date Reported: 2/15/01 Vulnerability: pi3web-isapi-bo Platforms Affected: Pi3Web Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Pi3Web ISAPI tstisapi.dll denial of service X-Force URL: http://xforce.iss.net/static/6113.php
Date Reported: 2/15/01 Vulnerability: pi3web-reveal-path Platforms Affected: Pi3Web Risk Factor: Low Attack Type: Network Based Brief Description: Pi3Web reveals physical path of server X-Force URL: http://xforce.iss.net/static/6114.php
Date Reported: 2/15/01 Vulnerability: bajie-execute-shell Platforms Affected: Bajie HTTP JServer Risk Factor: High Attack Type: Network Based Brief Description: Bajie HTTP JServer execute shell commands X-Force URL: http://xforce.iss.net/static/6117.php
Date Reported: 2/15/01 Vulnerability: bajie-directory-traversal Platforms Affected: Bajie HTTP JServer Risk Factor: High Attack Type: Network Based Brief Description: Bajie HTTP JServer directory traversal X-Force URL: http://xforce.iss.net/static/6115.php
Date Reported: 2/15/01 Vulnerability: resin-directory-traversal Platforms Affected: Resin Risk Factor: Medium Attack Type: Network Based Brief Description: Resin Web server directory traversal X-Force URL: http://xforce.iss.net/static/6118.php
Date Reported: 2/15/01 Vulnerability: netware-mitm-recover-passwords Platforms Affected: Netware Risk Factor: Low Attack Type: Network Based Brief Description: Netware "man in the middle" attack password recovery X-Force URL: http://xforce.iss.net/static/6116.php
Date Reported: 2/14/01 Vulnerability: firebox-pptp-dos Platforms Affected: WatchGuard Firebox II Risk Factor: High Attack Type: Network Based Brief Description: WatchGuard Firebox II PPTP denial of service X-Force URL: http://xforce.iss.net/static/6109.php
Date Reported: 2/14/01 Vulnerability: hp-virtualvault-iws-dos Platforms Affected: HP VirtualVault Risk Factor: Medium Attack Type: Network/Host Based Brief Description: HP VirtualVault iPlanet Web Server denial of service X-Force URL: http://xforce.iss.net/static/6110.php
Date Reported: 2/14/01 Vulnerability: kicq-execute-commands Platforms Affected: KICQ Risk Factor: High Attack Type: Network Based Brief Description: kicq could allow remote execution of commands X-Force URL: http://xforce.iss.net/static/6112.php
Date Reported: 2/14/01 Vulnerability: hp-text-editor-bo Platforms Affected: HPUX Risk Factor: Medium Attack Type: Host Based Brief Description: HP Text editors buffer overflow X-Force URL: http://xforce.iss.net/static/6111.php
Date Reported: 2/13/01 Vulnerability: sendtemp-pl-read-files Platforms Affected: sendtemp.pl Risk Factor: Medium Attack Type: Network/Host Based Brief Description: sendtemp.pl could allow an attacker to read files on the server X-Force URL: http://xforce.iss.net/static/6104.php
Date Reported: 2/13/01 Vulnerability: analog-alias-bo Platforms Affected: Analog ALIAS Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Analog ALIAS command buffer overflow X-Force URL: http://xforce.iss.net/static/6105.php
Date Reported: 2/13/01 Vulnerability: elm-long-string-bo Platforms Affected: Elm Risk Factor: Medium Attack Type: Host Based Brief Description: ELM -f command long string buffer overflow X-Force URL: http://xforce.iss.net/static/6151.php
Date Reported: 2/13/01 Vulnerability: winnt-pptp-dos Platforms Affected: Windows NT Risk Factor: Medium Attack Type: Network Based Brief Description: Windows NT PPTP denial of service X-Force URL: http://xforce.iss.net/static/6103.php
Date Reported: 2/12/01 Vulnerability: startinnfeed-format-string Platforms Affected: Inn Risk Factor: High Attack Type: Host Based Brief Description: Inn 'startinnfeed' binary format string attack X-Force URL: http://xforce.iss.net/static/6099.php
Date Reported: 2/12/01 Vulnerability: his-auktion-cgi-url Platforms Affected: HIS Auktion Risk Factor: Medium Attack Type: Network/Host Based Brief Description: HIS Auktion CGI script could allow attackers to view unauthorized files or execute commands X-Force URL: http://xforce.iss.net/static/6090.php
Date Reported: 2/12/01 Vulnerability: wayboard-cgi-view-files Platforms Affected: Way-BOARD Risk Factor: Medium Attack Type: Network Based Brief Description: Way-BOARD CGI could allow attackers to view unauthorized files X-Force URL: http://xforce.iss.net/static/6091.php
Date Reported: 2/12/01 Vulnerability: muskat-empower-url-dir Platforms Affected: Musket Empower Risk Factor: Low Attack Type: Network/Host Based Brief Description: Musket Empower could allow attackers to gain access to the DB directory path X-Force URL: http://xforce.iss.net/static/6093.php
Date Reported: 2/12/01 Vulnerability: icq-icu-rtf-dos Platforms Affected: LICQ Gnome ICU Risk Factor: Low Attack Type: Network/Host Based Brief Description: LICQ and Gnome ICU rtf file denial of service X-Force URL: http://xforce.iss.net/static/6096.php
Date Reported: 2/12/01 Vulnerability: commerce-cgi-view-files Platforms Affected: Commerce.cgi Risk Factor: Medium Attack Type: Network Based Brief Description: Commerce.cgi could allow attackers to view unauthorized files X-Force URL: http://xforce.iss.net/static/6095.php
Date Reported: 2/12/01 Vulnerability: roads-search-view-files Platforms Affected: ROADS Risk Factor: Medium Attack Type: Network Based Brief Description: ROADS could allow attackers to view unauthorized files using search.pl program X-Force URL: http://xforce.iss.net/static/6097.php
Date Reported: 2/12/01 Vulnerability: webpage-cgi-view-info Platforms Affected: WebPage.cgi Risk Factor: Low Attack Type: Network Based Brief Description: WebPage.cgi allows attackers to view sensitive information X-Force URL: http://xforce.iss.net/static/6100.php
Date Reported: 2/12/01 Vulnerability: webspirs-cgi-view-files Platforms Affected: WebSPIRS Risk Factor: Medium Attack Type: Network Based Brief Description: WebSPIRS CGI could allow an attacker to view unauthorized files X-Force URL: http://xforce.iss.net/static/6101.php
Date Reported: 2/12/01 Vulnerability: webpals-library-cgi-url Platforms Affected: WebPALS Risk Factor: Medium Attack Type: Network Based Brief Description: WebPALS Library System CGI script could allow attackers to view unauthorized files or execute commands X-Force URL: http://xforce.iss.net/static/6102.php
Date Reported: 2/11/01 Vulnerability: cobol-apptrack-nolicense-permissions Platforms Affected: MicroFocus Cobol Risk Factor: High Attack Type: Host Based Brief Description: MicroFocus Cobol with AppTrack enabled with nolicense permissions X-Force URL: http://xforce.iss.net/static/6092.php
Date Reported: 2/11/01 Vulnerability: cobol-apptrack-nolicense-symlink Platforms Affected: MicroFocus Cobol Risk Factor: High Attack Type: Host Based Brief Description: MicroFocus Cobol with AppTrack enabled allows symlink in nolicense X-Force URL: http://xforce.iss.net/static/6094.php
Date Reported: 2/10/01 Vulnerability: vixie-crontab-bo Platforms Affected: Vixie crontab Risk Factor: Medium Attack Type: Host Based Brief Description: Vixie crontab buffer overflow X-Force URL: http://xforce.iss.net/static/6098.php
Date Reported: 2/10/01 Vulnerability: novell-groupwise-bypass-policies Platforms Affected: Novell GroupWise Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Novell Groupwise allows user to bypass policies and view files X-Force URL: http://xforce.iss.net/static/6089.php
Date Reported: 2/9/01 Vulnerability: infobot-calc-gain-access Platforms Affected: Infobot Risk Factor: High Attack Type: Network Based Brief Description: Infobot 'calc' command allows remote users to gain access X-Force URL: http://xforce.iss.net/static/6078.php
Date Reported: 2/8/01 Vulnerability: linux-sysctl-read-memory Platforms Affected: Linux Risk Factor: Medium Attack Type: Host Based Brief Description: Linux kernel sysctl() read memory X-Force URL: http://xforce.iss.net/static/6079.php
Date Reported: 2/8/01 Vulnerability: openssh-bypass-authentication Platforms Affected: OpenSSH Risk Factor: High Attack Type: Network/Host Based Brief Description: OpenSSH 2.3.1 allows remote users to bypass authentication X-Force URL: http://xforce.iss.net/static/6084.php
Date Reported: 2/8/01 Vulnerability: lotus-notes-stored-forms Platforms Affected: Lotus Notes Risk Factor: High Attack Type: Network/Host Based Brief Description: Lotus Notes stored forms X-Force URL: http://xforce.iss.net/static/6087.php
Date Reported: 2/8/01 Vulnerability: linux-ptrace-modify-process Platforms Affected: Linux Risk Factor: High Attack Type: Host Based Brief Description: Linux kernel ptrace modify process X-Force URL: http://xforce.iss.net/static/6080.php
Date Reported: 2/8/01 Vulnerability: ssh-deattack-overwrite-memory Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH protocol 1.5 deattack.c allows memory to be overwritten X-Force URL: http://xforce.iss.net/static/6083.php
Date Reported: 2/7/01 Vulnerability: dc20ctrl-port-bo Platforms Affected: FreeBSD Risk Factor: Medium Attack Type: Host Based Brief Description: FreeBSD dc20ctrl port buffer overflow X-Force URL: http://xforce.iss.net/static/6077.php
Date Reported: 2/7/01 Vulnerability: ja-xklock-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: ja-xklock buffer overflow X-Force URL: http://xforce.iss.net/static/6073.php
Date Reported: 2/7/01 Vulnerability: ja-elvis-elvrec-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: FreeBSD ja-elvis port buffer overflow X-Force URL: http://xforce.iss.net/static/6074.php
Date Reported: 2/7/01 Vulnerability: ko-helvis-elvrec-bo Platforms Affected: FreeBSD Risk Factor: High Attack Type: Host Based Brief Description: FreeBSD ko-helvis port buffer overflow X-Force URL: http://xforce.iss.net/static/6075.php
Date Reported: 2/7/01 Vulnerability: serverworx-directory-traversal Platforms Affected: ServerWorx Risk Factor: Medium Attack Type: Network Based Brief Description: ServerWorx directory traversal X-Force URL: http://xforce.iss.net/static/6081.php
Date Reported: 2/7/01 Vulnerability: ntlm-ssp-elevate-privileges Platforms Affected: NTLM Risk Factor: High Attack Type: Host Based Brief Description: NTLM Security Support Provider could allow elevation of privileges X-Force URL: http://xforce.iss.net/static/6076.php
Date Reported: 2/7/01 Vulnerability: ssh-session-key-recovery Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH protocol 1.5 session key recovery X-Force URL: http://xforce.iss.net/static/6082.php
Date Reported: 2/6/01 Vulnerability: aolserver-directory-traversal Platforms Affected: AOLserver Risk Factor: Medium Attack Type: Network Based Brief Description: AOLserver directory traversal X-Force URL: http://xforce.iss.net/static/6069.php
Date Reported: 2/6/01 Vulnerability: chilisoft-asp-elevate-privileges Platforms Affected: Chili!Soft Risk Factor: High Attack Type: Network/Host Based Brief Description: Chili!Soft ASP could allow elevated privileges X-Force URL: http://xforce.iss.net/static/6072.php
Date Reported: 2/6/01 Vulnerability: win-udp-dos Platforms Affected: Windows Risk Factor: Medium Attack Type: Network/Host Based Brief Description: Windows UDP socket denial of service X-Force URL: http://xforce.iss.net/static/6070.php
Date Reported: 2/5/01 Vulnerability: ssh-daemon-failed-login Platforms Affected: SSH Risk Factor: High Attack Type: Network/Host Based Brief Description: SSH daemon failed login attempts are not logged X-Force URL: http://xforce.iss.net/static/6071.php
Date Reported: 2/5/01 Vulnerability: picserver-directory-traversal Platforms Affected: PicServer Risk Factor: Medium Attack Type: Network Based Brief Description: PicServer directory traversal X-Force URL: http://xforce.iss.net/static/6065.php
Date Reported: 2/5/01 Vulnerability: biblioweb-directory-traversal Platforms Affected: BiblioWeb Risk Factor: Medium Attack Type: Network Based Brief Description: BiblioWeb Server directory traversal X-Force URL: http://xforce.iss.net/static/6066.php
Date Reported: 2/5/01 Vulnerability: biblioweb-get-dos Platforms Affected: BiblioWeb Risk Factor: Low Attack Type: Network Based Brief Description: BiblioWeb Server GET request denial of service X-Force URL: http://xforce.iss.net/static/6068.php
Date Reported: 2/5/01 Vulnerability: ibm-netcommerce-reveal-information Platforms Affected: IBM Risk Factor: Medium Attack Type: Network/Host Based Brief Description: IBM Net.Commerce could reveal sensitive information X-Force URL: http://xforce.iss.net/static/6067.php
Date Reported: 2/5/01 Vulnerability: win-dde-elevate-privileges Platforms Affected: Windows DDE Risk Factor: High Attack Type: Host Based Brief Description: Windows DDE can allow the elevation of privileges X-Force URL: http://xforce.iss.net/static/6062.php
Date Reported: 2/4/01 Vulnerability: hsweb-directory-browsing Platforms Affected: HSWeb Risk Factor: Low Attack Type: Network Based Brief Description: HSWeb Web Server allows attacker to browse directories X-Force URL: http://xforce.iss.net/static/6061.php
Date Reported: 2/4/01 Vulnerability: sedum-directory-traversal Platforms Affected: SEDUM Risk Factor: Medium Attack Type: Network Based Brief Description: SEDUM HTTP Server directory traversal X-Force URL: http://xforce.iss.net/static/6063.php
Date Reported: 2/4/01 Vulnerability: free-java-directory-traversal Platforms Affected: Free Java Risk Factor: Medium Attack Type: Network Based Brief Description: Free Java Web Server directory traversal X-Force URL: http://xforce.iss.net/static/6064.php
Date Reported: 2/2/01 Vulnerability: goahead-directory-traversal Platforms Affected: GoAhead Risk Factor: High Attack Type: Network Based Brief Description: GoAhead Web Server directory traversal X-Force URL: http://xforce.iss.net/static/6046.php
Date Reported: 2/2/01 Vulnerability: gnuserv-tcp-cookie-overflow Platforms Affected: Gnuserv Risk Factor: High Attack Type: Network/Host Based Brief Description: Gnuserv TCP enabled cookie buffer overflow X-Force URL: http://xforce.iss.net/static/6056.php
Date Reported: 2/2/01 Vulnerability: xmail-ctrlserver-bo Platforms Affected: Xmail CTRLServer Risk Factor: High Attack Type: Network Based Brief Description: XMail CTRLServer buffer overflow X-Force URL: http://xforce.iss.net/static/6060.php
Date Reported: 2/2/01 Vulnerability: netscape-webpublisher-acl-permissions Platforms Affected: Netscape Web Publisher Risk Factor: Medium Attack Type: Network Based Brief Description: Netcape Web Publisher poor ACL permissions X-Force URL: http://xforce.iss.net/static/6058.php
Date Reported: 2/1/01 Vulnerability: cups-httpgets-dos Platforms Affected: CUPS Risk Factor: High Attack Type: Host Based Brief Description: CUPS httpGets() function denial of service X-Force URL: http://xforce.iss.net/static/6043.php
Date Reported: 2/1/01 Vulnerability: prospero-get-pin Platforms Affected: Prospero Risk Factor: High Attack Type: Network/Host Based Brief Description: Prospero GET request reveals PIN information X-Force URL: http://xforce.iss.net/static/6044.php
Date Reported: 2/1/01 Vulnerability: prospero-weak-permissions Platforms Affected: Prospero Risk Factor: High Attack Type: Network/Host Based Brief Description: Prospero uses weak permissions X-Force URL: http://xforce.iss.net/static/6045.php
Risk Factor Key:
High Any vulnerability that provides an attacker with immediate
access into a machine, gains superuser access, or bypasses
a firewall. Example: A vulnerable Sendmail 8.6.5 version
that allows an intruder to execute commands on mail
server.
Medium Any vulnerability that provides information that has a
high potential of giving system access to an intruder.
Example: A misconfigured TFTP or vulnerable NIS server
that allows an intruder to get the password file that
could contain an account with a guessable password.
Low Any vulnerability that provides information that
potentially could lead to a compromise. Example: A
finger that allows an intruder to find out who is online
and potential accounts to attempt to crack passwords
via brute force methods.
ISS is a leading global provider of security management solutions for e-business. By offering best-of-breed SAFEsuite(tm) security software, comprehensive ePatrol(tm) monitoring services and industry-leading expertise, ISS serves as its customers' trusted security provider protecting digital assets and ensuring the availability, confidentiality and integrity of computer systems and information critical to e-business success. ISS' security management solutions protect more than 5,000 customers including 21 of the 25 largest U.S. commercial banks, 9 of the 10 largest telecommunications companies and over 35 government agencies. Founded in 1994, ISS is headquartered in Atlanta, GA, with additional offices throughout North America and international operations in Asia, Australia, Europe and Latin America. For more information, visit the ISS Web site at www.iss.net or call 800-776-2362.
Copyright (c) 2001 by Internet Security Systems, Inc.
Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Alert in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission.
Disclaimer
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.
X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as well as on MIT's PGP key server and PGP.com's key server.
Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc.
-----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv
iQCVAwUBOqb8ojRfJiV99eG9AQGEaAP+KH+SQYNBsbUcv/mUJNUz7dDPIYVcmPNV 1xyO/ctnG6qScWnlXGltYS7Rj8T8tYAAZC77oDhFSvvs8CX1Dr32ImEyvOIJhMLA h0wKCV3HOAYJ662BASe3jbO3nL/bumNKCRL5heuIU85pQOuH9xbqXkmFEimDmG2B tT+ylKw4hn4= =kfHg -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200105-0064", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 3.2, "vendor": "ssh security", "version": null }, { "model": "catalyst csx", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "60005.3" }, { "model": null, "scope": null, "trust": 1.6, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openssh", "version": null }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.4.0" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.2.0" }, { "model": "ios 12.1 ex", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "catalyst", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "60006.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "60005.5" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "core sdi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "smoothwall", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "holger lamm", "version": null }, { "model": "ios 12.2xq", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.2xh", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.2xe", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.2xd", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.2xa", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.2t", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "12.2" }, { "model": "ios 12.1yf", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1yd", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1yc", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1yb", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xu", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xt", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xq", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xp", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xm", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xl", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xj", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xi", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xh", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xg", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xf", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xc", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1xb", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1t", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1ec", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.1e", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.0s", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "catalyst", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "60006.2(0.110)" }, { "model": "communications security ssh", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2.31" }, { "model": "communications security ssh", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2.30" }, { "model": "communications security ssh", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2.29" }, { "model": "communications security ssh", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2.28" }, { "model": "communications security ssh", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2.27" }, { "model": "communications security ssh", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2.26" }, { "model": "communications security ssh", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2.25" }, { "model": "communications security ssh", "scope": "eq", "trust": 0.3, "vendor": "ssh", "version": "1.2.24" }, { "model": "computing safeword agent for ssh", "scope": "eq", "trust": 0.3, "vendor": "secure", "version": "1.0" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "2.2" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "2.1.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "2.1" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "1.2.3" }, { "model": "openssh", "scope": "eq", "trust": 0.3, "vendor": "openssh", "version": "1.2.2" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1.1" }, { "model": "screenos r9", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.1" }, { "model": "screenos r1.1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.3" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "3.0.1" }, { "model": "screenos r5", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r4", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r3", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r2", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos r1", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "screenos", "scope": "eq", "trust": 0.3, "vendor": "netscreen", "version": "2.6.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3(1)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2(5)" }, { "model": "ios 12.1ya", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1xv" }, { "model": "ios 12.1xs", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xe", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1ez", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1ey", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1ex", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1dc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1db", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.10s", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "communications security ssh2", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.4" }, { "model": "communications security ssh2", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.3" }, { "model": "communications security ssh2", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.2" }, { "model": "communications security ssh2", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.1" }, { "model": "communications security ssh2", "scope": "ne", "trust": 0.3, "vendor": "ssh", "version": "2.0" }, { "model": "openssh", "scope": "ne", "trust": 0.3, "vendor": "openssh", "version": "2.3" }, { "model": "webns b11s", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "webns 1b6s", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "webns 0b22s", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.1" }, { "model": "webns 1b42s", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.0" }, { "model": "pix firewall", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6.0(1)" }, { "model": "pix firewall", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.3(2)" }, { "model": "pix firewall", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.2(6)" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.2(3)" }, { "model": "ios 12.2 t", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xa", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.2(1.1)" }, { "model": "ios 12.2 xq", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xh", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 xd1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 ec3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 ez1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 ey", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yf2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yd2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yc1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 yb4", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xy6", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.1(5)xv3" }, { "model": "ios 12.1 xu1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xr2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xg5", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xm4", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xt3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 xp4", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "catalyst pan", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "60006.3" }, { "model": "catalyst", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "60006.2(0.111)" }, { "model": "catalyst", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "60006.1(2.13)" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2" }, { "model": "ios 12.2yh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2ya", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xs", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2s", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2dd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2da", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2bc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2b", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1ye", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0xv" }, { "model": "ios 12.0xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0st", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0sp", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css11000 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60007.1(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60007.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.3(4)" }, { "model": "catalyst pan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.3" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.2(0.111)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.1(2.13)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.1(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(13)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4" }, { "model": "lamm pgp4pine", "scope": "eq", "trust": 0.3, "vendor": "holger", "version": "1.75.6" } ], "sources": [ { "db": "CERT/CC", "id": "VU#290140" }, { "db": "CERT/CC", "id": "VU#13877" }, { "db": "CERT/CC", "id": "VU#25309" }, { "db": "CERT/CC", "id": "VU#945216" }, { "db": "CERT/CC", "id": "VU#566640" }, { "db": "CERT/CC", "id": "VU#315308" }, { "db": "BID", "id": "2347" }, { "db": "BID", "id": "5114" }, { "db": "BID", "id": "2405" }, { "db": "NVD", "id": "CVE-2001-0317" }, { "db": "CNNVD", "id": "CNNVD-200105-038" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2001-0317" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Michal Zalewski \u003clcamtuf@bos.bindview.com\u003e on Feb 8, 2001.", "sources": [ { "db": "BID", "id": "2347" } ], "trust": 0.3 }, "cve": "CVE-2001-0317", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 1.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2001-0317", "trust": 1.0, "value": "LOW" }, { "author": "CARNEGIE MELLON", "id": "VU#290140", "trust": 0.8, "value": "21.09" }, { "author": "CARNEGIE MELLON", "id": "VU#13877", "trust": 0.8, "value": "6.84" }, { "author": "CARNEGIE MELLON", "id": "VU#25309", "trust": 0.8, "value": "0.39" }, { "author": "CARNEGIE MELLON", "id": "VU#945216", "trust": 0.8, "value": "99.00" }, { "author": "CARNEGIE MELLON", "id": "VU#566640", "trust": 0.8, "value": "0.68" }, { "author": "CARNEGIE MELLON", "id": "VU#651994", "trust": 0.8, "value": "1.50" }, { "author": "CARNEGIE MELLON", "id": "VU#315308", "trust": 0.8, "value": "2.06" }, { "author": "CNNVD", "id": "CNNVD-200105-038", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#290140" }, { "db": "CERT/CC", "id": "VU#13877" }, { "db": "CERT/CC", "id": "VU#25309" }, { "db": "CERT/CC", "id": "VU#945216" }, { "db": "CERT/CC", "id": "VU#566640" }, { "db": "CERT/CC", "id": "VU#651994" }, { "db": "CERT/CC", "id": "VU#315308" }, { "db": "NVD", "id": "CVE-2001-0317" }, { "db": "CNNVD", "id": "CNNVD-200105-038" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process. Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. There is a remote integer overflow vulnerability in several implementations of the SSH1 protocol that allows an attacker to execute arbitrary code with the privileges of the SSH daemon, typically root. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root. Secure Shell, or SSH, is an encrypted remote access protocol. SSH or code based on SSH is used by many systems all over the world and in a wide variety of commercial applications. An integer-overflow bug in the CRC32 compensation attack detection code may allow remote attackers to write values to arbitrary locations in memory. \nThis would occur in situations where large SSH packets are recieved by either a client or server, and a 32 bit representation of the SSH packet length is assigned to a 16 bit integer. The difference in data representation in these situations will cause the 16 bit variable to be assigned to zero (or a really low value). \nAs a result, future calls to malloc() as well as an index used to reference locations in memory can be corrupted by an attacker. This could occur in a manner that can be exploited to write certain numerical values to almost arbitrary locations in memory. \n**UPDATE**:\nThere have been reports suggesting that exploitation of this vulnerability may be widespread. \nSince early september, independent, reliable sources have confirmed that this vulnerability is being exploited by attackers on the Internet. Security Focus does not currently have the exploit code being used, however this record will be updated if and when it becomes available. \nNOTE: Cisco 11000 Content Service Switch family is vulnerable to this issue. All WebNS releases prior, but excluding, versions: 4.01 B42s, 4.10 22s, 5.0 B11s, 5.01 B6s, are vulnerable. \nSecure Computing SafeWord Agent for SSH is reportedly prone to this issue, as it is based on a vulnerable version of SSH. \n** NetScreen ScreenOS is not directly vulnerable to this issue, however the referenced exploit will cause devices using vulnerable versions of the software to stop functioning properly. This will result in a denial of service condition for NetScreen devices. This issue is in the Secure Command Shell (SCS) administrative interface, which is an implementation of SSHv1. SCS is not enabled on NetScreen devices by default. \nCisco has reported that scanning for SSH vulnerabilities on affected devices will cause excessive CPU consumption. The condition is due to a failure of the Cisco SSH implementation to properly process large SSH packets. As many of these devices are critical infrastructure components, more serious network outages may occur. \nCisco has released upgrades that will eliminate this vulnerability. An expired public key could cause GPG to fail the encryption of an outgoing message, without any error message or warning being delivered to the user. As a result, the user could transmit data, meant to be encrypted, as plaintext. \nTO UNSUBSCRIBE: email \"unsubscribe alert\" in the body of your message to\nmajordomo@iss.net Contact alert-owner@iss.net for help with any problems!\n---------------------------------------------------------------------------\n\n-----BEGIN PGP SIGNED MESSAGE-----\n\nISS X-Force has received reports that some individuals were unable to \nverify the PGP signature on the Security Alert Summary distributed earlier \nin the week. Due to this issue, X-Force is re-distributing the Security \nAlert Summary. We apologize for any inconvience this may have caused. \n\nInternet Security Systems Security Alert Summary\nMarch 5, 2001\nVolume 6 Number 4\n\nX-Force Vulnerability and Threat Database: http://xforce.iss.net/ To\nreceive these Alert Summaries as well as other Alerts and Advisories,\nsubscribe to the Internet Security Systems Alert mailing list at:\nhttp://xforce.iss.net/maillists/index.php\n\nThis summary can be found at http://xforce.iss.net/alerts/vol-6_num-4.php\n_____\n\nContents\n\n90 Reported Vulnerabilities\n\nRisk Factor Key\n\n_____\n\nDate Reported: 2/27/01\nVulnerability: a1-server-dos\nPlatforms Affected: A1 Server\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: A1 Server denial of service\nX-Force URL: http://xforce.iss.net/static/6161.php\n\n_____\n\nDate Reported: 2/27/01\nVulnerability: a1-server-directory-traversal\nPlatforms Affected: A1 Server\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: A1 Server directory traversal\nX-Force URL: http://xforce.iss.net/static/6162.php\n\n_____\n\nDate Reported: 2/27/01\nVulnerability: webreflex-web-server-dos\nPlatforms Affected: WebReflex\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: WebReflex Web server denial of service\nX-Force URL: http://xforce.iss.net/static/6163.php\n\n_____\n\nDate Reported: 2/26/01\nVulnerability: sudo-bo-elevate-privileges\nPlatforms Affected: Sudo\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Sudo buffer overflow could allow elevated user privileges\nX-Force URL: http://xforce.iss.net/static/6153.php\n\n_____\n\nDate Reported: 2/26/01\nVulnerability: mygetright-skin-overwrite-file\nPlatforms Affected: My GetRight\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: My GetRight \u0027skin\u0027 allows remote attacker to overwrite existing files\nX-Force URL: http://xforce.iss.net/static/6155.php\n\n_____\n\nDate Reported: 2/26/01\nVulnerability: mygetright-directory-traversal\nPlatforms Affected: My GetRight\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: My GetRight directory traversal\nX-Force URL: http://xforce.iss.net/static/6156.php\n\n_____\n\nDate Reported: 2/26/01\nVulnerability: win2k-event-viewer-bo\nPlatforms Affected: Windows 2000\nRisk Factor: once-only\nAttack Type: Host Based\nBrief Description: Windows 2000 event viewer buffer overflow\nX-Force URL: http://xforce.iss.net/static/6160.php\n\n_____\n\nDate Reported: 2/26/01\nVulnerability: netscape-collabra-cpu-dos\nPlatforms Affected: Netscape\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Netscape Collabra CPU denial of service\nX-Force URL: http://xforce.iss.net/static/6159.php\n\n_____\n\nDate Reported: 2/26/01\nVulnerability: netscape-collabra-kernel-dos\nPlatforms Affected: Netscape\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Netscape Collabra Server kernel denial of service\nX-Force URL: http://xforce.iss.net/static/6158.php\n\n_____\n\nDate Reported: 2/23/01\nVulnerability: mercur-expn-bo\nPlatforms Affected: MERCUR\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: MERCUR Mailserver EXPN buffer overflow\nX-Force URL: http://xforce.iss.net/static/6149.php\n\n_____\n\nDate Reported: 2/23/01\nVulnerability: sedum-http-dos\nPlatforms Affected: SEDUM\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: SEDUM HTTP server denial of service\nX-Force URL: http://xforce.iss.net/static/6152.php\n\n_____\n\nDate Reported: 2/23/01\nVulnerability: tru64-inetd-dos\nPlatforms Affected: Tru64\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Tru64 UNIX inetd denial of service\nX-Force URL: http://xforce.iss.net/static/6157.php\n\n_____\n\nDate Reported: 2/22/01\nVulnerability: outlook-vcard-bo\nPlatforms Affected: Microsoft Outlook\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Outlook and Outlook Express vCards buffer overflow\nX-Force URL: http://xforce.iss.net/static/6145.php\n\n_____\n\nDate Reported: 2/22/01\nVulnerability: ultimatebb-cookie-member-number\nPlatforms Affected: Ultimate Bulletin Board\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Ultimate Bulletin Board cookie allows attacker to change member number\nX-Force URL: http://xforce.iss.net/static/6144.php\n\n_____\n\nDate Reported: 2/21/01\nVulnerability: ultimatebb-cookie-gain-privileges\nPlatforms Affected: Ultimate Bulletin Board\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Ultimate Bulletin Board allows remote attacker to obtain cookie information\nX-Force URL: http://xforce.iss.net/static/6142.php\n\n_____\n\nDate Reported: 2/21/01\nVulnerability: sendmail-elevate-privileges\nPlatforms Affected: Sendmail\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Sendmail -bt command could allow the elevation of privileges\nX-Force URL: http://xforce.iss.net/static/6147.php\n\n_____\n\nDate Reported: 2/21/01\nVulnerability: jre-jdk-execute-commands\nPlatforms Affected: JRE/JDK\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: JRE/JDK could allow unauthorized execution of commands\nX-Force URL: http://xforce.iss.net/static/6143.php\n\n_____\n\nDate Reported: 2/20/01\nVulnerability: licq-remote-port-dos\nPlatforms Affected: LICQ\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: LICQ remote denial of service\nX-Force URL: http://xforce.iss.net/static/6134.php\n\n_____\n\nDate Reported: 2/20/01\nVulnerability: pgp4pine-expired-keys\nPlatforms Affected: pgp4pine\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: pgp4pine may transmit messages using expired public keys\nX-Force URL: http://xforce.iss.net/static/6135.php\n\n_____\n\nDate Reported: 2/20/01\nVulnerability: chilisoft-asp-view-files\nPlatforms Affected: Chili!Soft ASP\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Chili!Soft ASP allows remote attackers to gain access to sensitive information\nX-Force URL: http://xforce.iss.net/static/6137.php\n\n_____\n\nDate Reported: 2/20/01\nVulnerability: win2k-domain-controller-dos\nPlatforms Affected: Windows 2000\nRisk Factor: once-only\nAttack Type: Network/Host Based\nBrief Description: Windows 2000 domain controller denial of service\nX-Force URL: http://xforce.iss.net/static/6136.php\n\n_____\n\nDate Reported: 2/19/01\nVulnerability: asx-remote-dos\nPlatforms Affected: ASX Switches\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: ASX switches allow remote denial of service\nX-Force URL: http://xforce.iss.net/static/6133.php\n\n_____\n\nDate Reported: 2/18/01\nVulnerability: http-cgi-mailnews-username\nPlatforms Affected: Mailnews.cgi\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Mailnews.cgi allows remote attacker to execute shell commands using username\nX-Force URL: http://xforce.iss.net/static/6139.php\n\n_____\n\nDate Reported: 2/17/01\nVulnerability: badblue-ext-reveal-path\nPlatforms Affected: BadBlue\nRisk Factor: Low\nAttack Type: Network Based\nBrief Description: BadBlue ext.dll library reveals path\nX-Force URL: http://xforce.iss.net/static/6130.php\n\n_____\n\nDate Reported: 2/17/01\nVulnerability: badblue-ext-dos\nPlatforms Affected: BadBlue\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: BadBlue ext.dll library denial of service\nX-Force URL: http://xforce.iss.net/static/6131.php\n\n_____\n\nDate Reported: 2/17/01\nVulnerability: moby-netsuite-bo\nPlatforms Affected: Moby\u0027s NetSuite\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Moby\u0027s NetSuite Web server buffer overflow\nX-Force URL: http://xforce.iss.net/static/6132.php\n\n_____\n\nDate Reported: 2/16/01\nVulnerability: webactive-directory-traversal\nPlatforms Affected: WEBactive\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: WEBactive HTTP Server directory traversal\nX-Force URL: http://xforce.iss.net/static/6121.php\n\n_____\n\nDate Reported: 2/16/01\nVulnerability: esone-cgi-directory-traversal\nPlatforms Affected: ES.One store.cgi\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Thinking Arts ES.One store.cgi directory traversal\nX-Force URL: http://xforce.iss.net/static/6124.php\n\n_____\n\nDate Reported: 2/16/01\nVulnerability: vshell-username-bo\nPlatforms Affected: VShell\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: VShell username buffer overflow\nX-Force URL: http://xforce.iss.net/static/6146.php\n\n_____\n\nDate Reported: 2/16/01\nVulnerability: vshell-port-forwarding-rule\nPlatforms Affected: VShell\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: VShell uses weak port forwarding rule\nX-Force URL: http://xforce.iss.net/static/6148.php\n\n_____\n\nDate Reported: 2/15/01\nVulnerability: pi3web-isapi-bo\nPlatforms Affected: Pi3Web\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Pi3Web ISAPI tstisapi.dll denial of service\nX-Force URL: http://xforce.iss.net/static/6113.php\n\n_____\n\nDate Reported: 2/15/01\nVulnerability: pi3web-reveal-path\nPlatforms Affected: Pi3Web\nRisk Factor: Low\nAttack Type: Network Based\nBrief Description: Pi3Web reveals physical path of server\nX-Force URL: http://xforce.iss.net/static/6114.php\n\n_____\n\nDate Reported: 2/15/01\nVulnerability: bajie-execute-shell\nPlatforms Affected: Bajie HTTP JServer\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Bajie HTTP JServer execute shell commands\nX-Force URL: http://xforce.iss.net/static/6117.php\n\n_____\n\nDate Reported: 2/15/01\nVulnerability: bajie-directory-traversal\nPlatforms Affected: Bajie HTTP JServer\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Bajie HTTP JServer directory traversal\nX-Force URL: http://xforce.iss.net/static/6115.php\n\n_____\n\nDate Reported: 2/15/01\nVulnerability: resin-directory-traversal\nPlatforms Affected: Resin\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Resin Web server directory traversal\nX-Force URL: http://xforce.iss.net/static/6118.php\n\n_____\n\nDate Reported: 2/15/01\nVulnerability: netware-mitm-recover-passwords\nPlatforms Affected: Netware\nRisk Factor: Low\nAttack Type: Network Based\nBrief Description: Netware \"man in the middle\" attack password recovery\nX-Force URL: http://xforce.iss.net/static/6116.php\n\n_____\n\nDate Reported: 2/14/01\nVulnerability: firebox-pptp-dos\nPlatforms Affected: WatchGuard Firebox II\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: WatchGuard Firebox II PPTP denial of service\nX-Force URL: http://xforce.iss.net/static/6109.php\n\n_____\n\nDate Reported: 2/14/01\nVulnerability: hp-virtualvault-iws-dos\nPlatforms Affected: HP VirtualVault\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: HP VirtualVault iPlanet Web Server denial of service\nX-Force URL: http://xforce.iss.net/static/6110.php\n\n_____\n\nDate Reported: 2/14/01\nVulnerability: kicq-execute-commands\nPlatforms Affected: KICQ\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: kicq could allow remote execution of commands\nX-Force URL: http://xforce.iss.net/static/6112.php\n\n_____\n\nDate Reported: 2/14/01\nVulnerability: hp-text-editor-bo\nPlatforms Affected: HPUX\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: HP Text editors buffer overflow\nX-Force URL: http://xforce.iss.net/static/6111.php\n\n_____\n\nDate Reported: 2/13/01\nVulnerability: sendtemp-pl-read-files\nPlatforms Affected: sendtemp.pl\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: sendtemp.pl could allow an attacker to read files on the server\nX-Force URL: http://xforce.iss.net/static/6104.php\n\n_____\n\nDate Reported: 2/13/01\nVulnerability: analog-alias-bo\nPlatforms Affected: Analog ALIAS\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Analog ALIAS command buffer overflow\nX-Force URL: http://xforce.iss.net/static/6105.php\n\n_____\n\nDate Reported: 2/13/01\nVulnerability: elm-long-string-bo\nPlatforms Affected: Elm\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: ELM -f command long string buffer overflow\nX-Force URL: http://xforce.iss.net/static/6151.php\n\n_____\n\nDate Reported: 2/13/01\nVulnerability: winnt-pptp-dos\nPlatforms Affected: Windows NT\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Windows NT PPTP denial of service\nX-Force URL: http://xforce.iss.net/static/6103.php\n\n_____\n\nDate Reported: 2/12/01\nVulnerability: startinnfeed-format-string\nPlatforms Affected: Inn\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Inn \u0027startinnfeed\u0027 binary format string attack\nX-Force URL: http://xforce.iss.net/static/6099.php\n\n_____\n\nDate Reported: 2/12/01\nVulnerability: his-auktion-cgi-url\nPlatforms Affected: HIS Auktion\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: HIS Auktion CGI script could allow attackers to view unauthorized \n files or execute commands\nX-Force URL: http://xforce.iss.net/static/6090.php\n\n_____\n\nDate Reported: 2/12/01\nVulnerability: wayboard-cgi-view-files\nPlatforms Affected: Way-BOARD\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Way-BOARD CGI could allow attackers to view unauthorized files\nX-Force URL: http://xforce.iss.net/static/6091.php\n\n_____\n\nDate Reported: 2/12/01\nVulnerability: muskat-empower-url-dir\nPlatforms Affected: Musket Empower\nRisk Factor: Low\nAttack Type: Network/Host Based\nBrief Description: Musket Empower could allow attackers to gain access to the DB directory path\nX-Force URL: http://xforce.iss.net/static/6093.php\n\n_____\n\nDate Reported: 2/12/01\nVulnerability: icq-icu-rtf-dos\nPlatforms Affected: LICQ\n Gnome ICU\nRisk Factor: Low\nAttack Type: Network/Host Based\nBrief Description: LICQ and Gnome ICU rtf file denial of service\nX-Force URL: http://xforce.iss.net/static/6096.php\n\n_____\n\nDate Reported: 2/12/01\nVulnerability: commerce-cgi-view-files\nPlatforms Affected: Commerce.cgi\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Commerce.cgi could allow attackers to view unauthorized files\nX-Force URL: http://xforce.iss.net/static/6095.php\n\n_____\n\nDate Reported: 2/12/01\nVulnerability: roads-search-view-files\nPlatforms Affected: ROADS\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: ROADS could allow attackers to view unauthorized files using search.pl program\nX-Force URL: http://xforce.iss.net/static/6097.php\n\n_____\n\nDate Reported: 2/12/01\nVulnerability: webpage-cgi-view-info\nPlatforms Affected: WebPage.cgi\nRisk Factor: Low\nAttack Type: Network Based\nBrief Description: WebPage.cgi allows attackers to view sensitive information\nX-Force URL: http://xforce.iss.net/static/6100.php\n\n_____\n\nDate Reported: 2/12/01\nVulnerability: webspirs-cgi-view-files\nPlatforms Affected: WebSPIRS\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: WebSPIRS CGI could allow an attacker to view unauthorized files\nX-Force URL: http://xforce.iss.net/static/6101.php\n\n_____\n\nDate Reported: 2/12/01\nVulnerability: webpals-library-cgi-url\nPlatforms Affected: WebPALS\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: WebPALS Library System CGI script could allow attackers to view \n unauthorized files or execute commands\nX-Force URL: http://xforce.iss.net/static/6102.php\n\n_____\n\nDate Reported: 2/11/01\nVulnerability: cobol-apptrack-nolicense-permissions\nPlatforms Affected: MicroFocus Cobol\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: MicroFocus Cobol with AppTrack enabled with nolicense permissions\nX-Force URL: http://xforce.iss.net/static/6092.php\n\n_____\n\nDate Reported: 2/11/01\nVulnerability: cobol-apptrack-nolicense-symlink\nPlatforms Affected: MicroFocus Cobol\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: MicroFocus Cobol with AppTrack enabled allows symlink in nolicense\nX-Force URL: http://xforce.iss.net/static/6094.php\n\n_____\n\nDate Reported: 2/10/01\nVulnerability: vixie-crontab-bo\nPlatforms Affected: Vixie crontab\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Vixie crontab buffer overflow\nX-Force URL: http://xforce.iss.net/static/6098.php\n\n_____\n\nDate Reported: 2/10/01\nVulnerability: novell-groupwise-bypass-policies\nPlatforms Affected: Novell GroupWise\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Novell Groupwise allows user to bypass policies and view files\nX-Force URL: http://xforce.iss.net/static/6089.php\n\n_____\n\nDate Reported: 2/9/01\nVulnerability: infobot-calc-gain-access\nPlatforms Affected: Infobot\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: Infobot \u0027calc\u0027 command allows remote users to gain access\nX-Force URL: http://xforce.iss.net/static/6078.php\n\n_____\n\nDate Reported: 2/8/01\nVulnerability: linux-sysctl-read-memory\nPlatforms Affected: Linux\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: Linux kernel sysctl() read memory\nX-Force URL: http://xforce.iss.net/static/6079.php\n\n_____\n\nDate Reported: 2/8/01\nVulnerability: openssh-bypass-authentication\nPlatforms Affected: OpenSSH\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: OpenSSH 2.3.1 allows remote users to bypass authentication\nX-Force URL: http://xforce.iss.net/static/6084.php\n\n_____\n\nDate Reported: 2/8/01\nVulnerability: lotus-notes-stored-forms\nPlatforms Affected: Lotus Notes\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: Lotus Notes stored forms\nX-Force URL: http://xforce.iss.net/static/6087.php\n\n_____\n\nDate Reported: 2/8/01\nVulnerability: linux-ptrace-modify-process\nPlatforms Affected: Linux\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Linux kernel ptrace modify process\nX-Force URL: http://xforce.iss.net/static/6080.php\n\n_____\n\nDate Reported: 2/8/01\nVulnerability: ssh-deattack-overwrite-memory\nPlatforms Affected: SSH\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: SSH protocol 1.5 deattack.c allows memory to be overwritten\nX-Force URL: http://xforce.iss.net/static/6083.php\n\n_____\n\nDate Reported: 2/7/01\nVulnerability: dc20ctrl-port-bo\nPlatforms Affected: FreeBSD\nRisk Factor: Medium\nAttack Type: Host Based\nBrief Description: FreeBSD dc20ctrl port buffer overflow\nX-Force URL: http://xforce.iss.net/static/6077.php\n\n_____\n\nDate Reported: 2/7/01\nVulnerability: ja-xklock-bo\nPlatforms Affected: FreeBSD\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: ja-xklock buffer overflow\nX-Force URL: http://xforce.iss.net/static/6073.php\n\n_____\n\nDate Reported: 2/7/01\nVulnerability: ja-elvis-elvrec-bo\nPlatforms Affected: FreeBSD\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: FreeBSD ja-elvis port buffer overflow\nX-Force URL: http://xforce.iss.net/static/6074.php\n\n_____\n\nDate Reported: 2/7/01\nVulnerability: ko-helvis-elvrec-bo\nPlatforms Affected: FreeBSD\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: FreeBSD ko-helvis port buffer overflow\nX-Force URL: http://xforce.iss.net/static/6075.php\n\n_____\n\nDate Reported: 2/7/01\nVulnerability: serverworx-directory-traversal\nPlatforms Affected: ServerWorx\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: ServerWorx directory traversal\nX-Force URL: http://xforce.iss.net/static/6081.php\n\n_____\n\nDate Reported: 2/7/01\nVulnerability: ntlm-ssp-elevate-privileges\nPlatforms Affected: NTLM\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: NTLM Security Support Provider could allow elevation of privileges\nX-Force URL: http://xforce.iss.net/static/6076.php\n\n_____\n\nDate Reported: 2/7/01\nVulnerability: ssh-session-key-recovery\nPlatforms Affected: SSH\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: SSH protocol 1.5 session key recovery\nX-Force URL: http://xforce.iss.net/static/6082.php\n\n_____\n\nDate Reported: 2/6/01\nVulnerability: aolserver-directory-traversal\nPlatforms Affected: AOLserver\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: AOLserver directory traversal\nX-Force URL: http://xforce.iss.net/static/6069.php\n\n_____\n\nDate Reported: 2/6/01\nVulnerability: chilisoft-asp-elevate-privileges\nPlatforms Affected: Chili!Soft\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: Chili!Soft ASP could allow elevated privileges\nX-Force URL: http://xforce.iss.net/static/6072.php\n\n_____\n\nDate Reported: 2/6/01\nVulnerability: win-udp-dos\nPlatforms Affected: Windows\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: Windows UDP socket denial of service\nX-Force URL: http://xforce.iss.net/static/6070.php\n\n_____\n\nDate Reported: 2/5/01\nVulnerability: ssh-daemon-failed-login\nPlatforms Affected: SSH\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: SSH daemon failed login attempts are not logged\nX-Force URL: http://xforce.iss.net/static/6071.php\n\n_____\n\nDate Reported: 2/5/01\nVulnerability: picserver-directory-traversal\nPlatforms Affected: PicServer\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: PicServer directory traversal\nX-Force URL: http://xforce.iss.net/static/6065.php\n\n_____\n\nDate Reported: 2/5/01\nVulnerability: biblioweb-directory-traversal\nPlatforms Affected: BiblioWeb\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: BiblioWeb Server directory traversal\nX-Force URL: http://xforce.iss.net/static/6066.php\n\n_____\n\nDate Reported: 2/5/01\nVulnerability: biblioweb-get-dos\nPlatforms Affected: BiblioWeb\nRisk Factor: Low\nAttack Type: Network Based\nBrief Description: BiblioWeb Server GET request denial of service\nX-Force URL: http://xforce.iss.net/static/6068.php\n\n_____\n\nDate Reported: 2/5/01\nVulnerability: ibm-netcommerce-reveal-information\nPlatforms Affected: IBM\nRisk Factor: Medium\nAttack Type: Network/Host Based\nBrief Description: IBM Net.Commerce could reveal sensitive information\nX-Force URL: http://xforce.iss.net/static/6067.php\n\n_____\n\nDate Reported: 2/5/01\nVulnerability: win-dde-elevate-privileges\nPlatforms Affected: Windows DDE\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: Windows DDE can allow the elevation of privileges\nX-Force URL: http://xforce.iss.net/static/6062.php\n\n_____\n\nDate Reported: 2/4/01\nVulnerability: hsweb-directory-browsing\nPlatforms Affected: HSWeb\nRisk Factor: Low\nAttack Type: Network Based\nBrief Description: HSWeb Web Server allows attacker to browse directories\nX-Force URL: http://xforce.iss.net/static/6061.php\n\n_____\n\nDate Reported: 2/4/01\nVulnerability: sedum-directory-traversal\nPlatforms Affected: SEDUM\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: SEDUM HTTP Server directory traversal\nX-Force URL: http://xforce.iss.net/static/6063.php\n\n_____\n\nDate Reported: 2/4/01\nVulnerability: free-java-directory-traversal\nPlatforms Affected: Free Java\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Free Java Web Server directory traversal\nX-Force URL: http://xforce.iss.net/static/6064.php\n\n_____\n\nDate Reported: 2/2/01\nVulnerability: goahead-directory-traversal\nPlatforms Affected: GoAhead\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: GoAhead Web Server directory traversal\nX-Force URL: http://xforce.iss.net/static/6046.php\n\n_____\n\nDate Reported: 2/2/01\nVulnerability: gnuserv-tcp-cookie-overflow\nPlatforms Affected: Gnuserv\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: Gnuserv TCP enabled cookie buffer overflow\nX-Force URL: http://xforce.iss.net/static/6056.php\n\n_____\n\nDate Reported: 2/2/01\nVulnerability: xmail-ctrlserver-bo\nPlatforms Affected: Xmail CTRLServer\nRisk Factor: High\nAttack Type: Network Based\nBrief Description: XMail CTRLServer buffer overflow\nX-Force URL: http://xforce.iss.net/static/6060.php\n\n_____\n\nDate Reported: 2/2/01\nVulnerability: netscape-webpublisher-acl-permissions\nPlatforms Affected: Netscape Web Publisher\nRisk Factor: Medium\nAttack Type: Network Based\nBrief Description: Netcape Web Publisher poor ACL permissions\nX-Force URL: http://xforce.iss.net/static/6058.php\n\n_____\n\nDate Reported: 2/1/01\nVulnerability: cups-httpgets-dos\nPlatforms Affected: CUPS\nRisk Factor: High\nAttack Type: Host Based\nBrief Description: CUPS httpGets() function denial of service\nX-Force URL: http://xforce.iss.net/static/6043.php\n\n_____\n\nDate Reported: 2/1/01\nVulnerability: prospero-get-pin\nPlatforms Affected: Prospero\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: Prospero GET request reveals PIN information\nX-Force URL: http://xforce.iss.net/static/6044.php\n\n_____\n\nDate Reported: 2/1/01\nVulnerability: prospero-weak-permissions\nPlatforms Affected: Prospero\nRisk Factor: High\nAttack Type: Network/Host Based\nBrief Description: Prospero uses weak permissions\nX-Force URL: http://xforce.iss.net/static/6045.php\n\n_____\n\nRisk Factor Key:\n\n High Any vulnerability that provides an attacker with immediate\n access into a machine, gains superuser access, or bypasses\n a firewall. Example: A vulnerable Sendmail 8.6.5 version\n that allows an intruder to execute commands on mail\n server. \n Medium Any vulnerability that provides information that has a\n high potential of giving system access to an intruder. \n Example: A misconfigured TFTP or vulnerable NIS server\n that allows an intruder to get the password file that\n could contain an account with a guessable password. \n Low Any vulnerability that provides information that\n potentially could lead to a compromise. Example: A\n finger that allows an intruder to find out who is online\n and potential accounts to attempt to crack passwords\n via brute force methods. \n\n________\n\n\nISS is a leading global provider of security management solutions for\ne-business. By offering best-of-breed SAFEsuite(tm) security software,\ncomprehensive ePatrol(tm) monitoring services and industry-leading\nexpertise, ISS serves as its customers\u0027 trusted security provider\nprotecting digital assets and ensuring the availability, confidentiality and\nintegrity of computer systems and information critical to e-business\nsuccess. ISS\u0027 security management solutions protect more than 5,000\ncustomers including 21 of the 25 largest U.S. commercial banks, 9 of the 10\nlargest telecommunications companies and over 35 government agencies. \nFounded in 1994, ISS is headquartered in Atlanta, GA, with additional\noffices throughout North America and international operations in Asia,\nAustralia, Europe and Latin America. For more information, visit the ISS Web\nsite at www.iss.net or call 800-776-2362. \n\nCopyright (c) 2001 by Internet Security Systems, Inc. \n\nPermission is hereby granted for the redistribution of this Alert\nelectronically. It is not to be edited in any way without express consent\nof the X-Force. If you wish to reprint the whole or any part of this Alert\nin any other medium excluding electronic medium, please e-mail\nxforce@iss.net for permission. \n\nDisclaimer\n\nThe information within this paper may change without notice. Use of this\ninformation constitutes acceptance for use in an AS IS condition. There are\nNO warranties with regard to this information. In no event shall the author\nbe liable for any damages whatsoever arising out of or in connection with\nthe use or spread of this information. Any use of this information is at the\nuser\u0027s own risk. \n\n\n\nX-Force PGP Key available at: http://xforce.iss.net/sensitive.php as \nwell as on MIT\u0027s PGP key server and PGP.com\u0027s key server. \n\nPlease send suggestions, updates, and comments to: X-Force xforce@iss.net\nof Internet Security Systems, Inc. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: 2.6.3a\nCharset: noconv\n\niQCVAwUBOqb8ojRfJiV99eG9AQGEaAP+KH+SQYNBsbUcv/mUJNUz7dDPIYVcmPNV\n1xyO/ctnG6qScWnlXGltYS7Rj8T8tYAAZC77oDhFSvvs8CX1Dr32ImEyvOIJhMLA\nh0wKCV3HOAYJ662BASe3jbO3nL/bumNKCRL5heuIU85pQOuH9xbqXkmFEimDmG2B\ntT+ylKw4hn4=\n=kfHg\n-----END PGP SIGNATURE-----\n\n", "sources": [ { "db": "NVD", "id": "CVE-2001-0317" }, { "db": "CERT/CC", "id": "VU#290140" }, { "db": "CERT/CC", "id": "VU#13877" }, { "db": "CERT/CC", "id": "VU#25309" }, { "db": "CERT/CC", "id": "VU#945216" }, { "db": "CERT/CC", "id": "VU#566640" }, { "db": "CERT/CC", "id": "VU#651994" }, { "db": "CERT/CC", "id": "VU#315308" }, { "db": "BID", "id": "2347" }, { "db": "BID", "id": "5114" }, { "db": "BID", "id": "2405" }, { "db": "PACKETSTORM", "id": "24431" } ], "trust": 6.84 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#13877", "trust": 3.2 }, { "db": "CERT/CC", "id": "VU#945216", "trust": 2.4 }, { "db": "CERT/CC", "id": "VU#25309", "trust": 2.4 }, { "db": "NVD", "id": "CVE-2001-0317", "trust": 1.6 }, { "db": "BID", "id": "5114", "trust": 1.1 }, { "db": "BID", "id": "2347", "trust": 1.1 }, { "db": "BID", "id": "2405", "trust": 1.1 }, { "db": "XF", "id": "6083", "trust": 0.9 }, { "db": "XF", "id": "6135", "trust": 0.9 }, { "db": "XF", "id": "6063", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#290140", "trust": 0.8 }, { "db": "XF", "id": "6449", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#566640", "trust": 0.8 }, { "db": "BID", "id": "2335", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#651994", "trust": 0.8 }, { "db": "XF", "id": "6472", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#315308", "trust": 0.8 }, { "db": "XF", "id": "6080", "trust": 0.7 }, { "db": "REDHAT", "id": "RHSA-2001:013", "trust": 0.6 }, { "db": "CALDERA", "id": "CSSA-2001-009", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20010213 TRUSTIX SECURITY ADVISORY - PROFTPD, KERNEL", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200105-038", "trust": 0.6 }, { "db": "XF", "id": "6115", "trust": 0.1 }, { "db": "XF", "id": "6075", "trust": 0.1 }, { "db": "XF", "id": "6149", "trust": 0.1 }, { "db": "XF", "id": "6145", "trust": 0.1 }, { "db": "XF", "id": "6136", "trust": 0.1 }, { "db": "XF", "id": "6065", "trust": 0.1 }, { "db": "XF", "id": "6157", "trust": 0.1 }, { "db": "XF", "id": "6058", "trust": 0.1 }, { "db": "XF", "id": "6161", "trust": 0.1 }, { "db": "XF", "id": "6109", "trust": 0.1 }, { "db": "XF", "id": "6121", "trust": 0.1 }, { "db": "XF", "id": "6062", "trust": 0.1 }, { "db": "XF", "id": "6137", "trust": 0.1 }, { "db": "XF", "id": "6101", "trust": 0.1 }, { "db": "XF", "id": "6089", "trust": 0.1 }, { "db": "XF", "id": "6072", "trust": 0.1 }, { "db": "XF", "id": "6143", "trust": 0.1 }, { "db": "XF", "id": "6084", "trust": 0.1 }, { "db": "XF", "id": "6100", "trust": 0.1 }, { "db": "XF", "id": "6071", "trust": 0.1 }, { "db": "XF", "id": "6073", "trust": 0.1 }, { "db": "XF", "id": "6116", "trust": 0.1 }, { "db": "XF", "id": "6144", "trust": 0.1 }, { "db": "XF", "id": "6104", "trust": 0.1 }, { "db": "XF", "id": "6094", "trust": 0.1 }, { "db": "XF", "id": "6087", "trust": 0.1 }, { "db": "XF", "id": "6090", "trust": 0.1 }, { "db": "XF", "id": "6046", "trust": 0.1 }, { "db": "XF", "id": "6056", "trust": 0.1 }, { "db": "XF", "id": "6060", "trust": 0.1 }, { "db": "XF", "id": "6130", "trust": 0.1 }, { "db": "XF", "id": "6092", "trust": 0.1 }, { "db": "XF", "id": "6118", "trust": 0.1 }, { "db": "XF", "id": "6117", "trust": 0.1 }, { "db": "XF", "id": "6098", "trust": 0.1 }, { "db": "XF", "id": "6156", "trust": 0.1 }, { "db": "XF", "id": "6113", "trust": 0.1 }, { "db": "XF", "id": "6067", "trust": 0.1 }, { "db": "XF", "id": "6064", "trust": 0.1 }, { "db": "XF", "id": "6045", "trust": 0.1 }, { "db": "XF", "id": "6147", "trust": 0.1 }, { "db": "XF", "id": "6095", "trust": 0.1 }, { "db": "XF", "id": "6131", "trust": 0.1 }, { "db": "XF", "id": "6114", "trust": 0.1 }, { "db": "XF", "id": "6134", "trust": 0.1 }, { "db": "XF", "id": "6074", "trust": 0.1 }, { "db": "XF", "id": "6044", "trust": 0.1 }, { "db": "XF", "id": "6112", "trust": 0.1 }, { "db": "XF", "id": "6077", "trust": 0.1 }, { "db": "XF", "id": "6148", "trust": 0.1 }, { "db": "XF", "id": "6146", "trust": 0.1 }, { "db": "XF", "id": "6078", "trust": 0.1 }, { "db": "XF", "id": "6110", "trust": 0.1 }, { "db": "XF", "id": "6132", "trust": 0.1 }, { "db": "XF", "id": "6099", "trust": 0.1 }, { "db": "XF", "id": "6079", "trust": 0.1 }, { "db": "XF", "id": "6102", "trust": 0.1 }, { "db": "XF", "id": "6096", "trust": 0.1 }, { "db": "XF", "id": "6142", "trust": 0.1 }, { "db": "XF", "id": "6091", "trust": 0.1 }, { "db": "XF", "id": "6158", "trust": 0.1 }, { "db": "XF", "id": "6162", "trust": 0.1 }, { "db": "XF", "id": "6163", "trust": 0.1 }, { "db": "XF", "id": "6155", "trust": 0.1 }, { "db": "XF", "id": "6081", "trust": 0.1 }, { "db": "XF", "id": "6160", "trust": 0.1 }, { "db": "XF", "id": "6111", "trust": 0.1 }, { "db": "XF", "id": "6152", "trust": 0.1 }, { "db": "XF", "id": "6068", "trust": 0.1 }, { "db": "XF", "id": "6043", "trust": 0.1 }, { "db": "XF", "id": "6076", "trust": 0.1 }, { "db": "XF", "id": "6103", "trust": 0.1 }, { "db": "XF", "id": "6070", "trust": 0.1 }, { "db": "XF", "id": "6133", "trust": 0.1 }, { "db": "XF", "id": "6153", "trust": 0.1 }, { "db": "XF", "id": "6082", "trust": 0.1 }, { "db": "XF", "id": "6124", "trust": 0.1 }, { "db": "XF", "id": "6061", "trust": 0.1 }, { "db": "XF", "id": "6066", "trust": 0.1 }, { "db": "XF", "id": "6097", "trust": 0.1 }, { "db": "XF", "id": "6105", "trust": 0.1 }, { "db": "XF", "id": "6159", "trust": 0.1 }, { "db": "XF", "id": "6069", "trust": 0.1 }, { "db": "XF", "id": "6093", "trust": 0.1 }, { "db": "XF", "id": "6139", "trust": 0.1 }, { "db": "XF", "id": "6151", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "24431", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#290140" }, { "db": "CERT/CC", "id": "VU#13877" }, { "db": "CERT/CC", "id": "VU#25309" }, { "db": "CERT/CC", "id": "VU#945216" }, { "db": "CERT/CC", "id": "VU#566640" }, { "db": "CERT/CC", "id": "VU#651994" }, { "db": "CERT/CC", "id": "VU#315308" }, { "db": "BID", "id": "2347" }, { "db": "BID", "id": "5114" }, { "db": "BID", "id": "2405" }, { "db": "PACKETSTORM", "id": "24431" }, { "db": "NVD", "id": "CVE-2001-0317" }, { "db": "CNNVD", "id": "CNNVD-200105-038" } ] }, "id": "VAR-200105-0064", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.8770026 }, "last_update_date": "2023-12-18T11:09:33.896000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2001-0317" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.kb.cert.org/vuls/id/13877" }, { "trust": 2.4, "url": "http://www.ssh.com/products/ssh/cert/" }, { "trust": 1.6, "url": "http://www.cert.org/advisories/ca-2001-35.html" }, { "trust": 1.6, "url": "http://www.kb.cert.org/vuls/id/945216" }, { "trust": 1.6, "url": "http://www.kb.cert.org/vuls/id/25309" }, { "trust": 1.6, "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0267.html" }, { "trust": 1.6, "url": "http://www.caldera.com/support/security/advisories/cssa-2001-009.0.txt" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2001-013.html" }, { "trust": 1.1, "url": "http://www.cisco.com/warp/public/707/ssh-scanning.shtml" }, { "trust": 1.1, "url": "http://www.cisco.com/warp/public/707/ssh-multiple-pub.html" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6080" }, { "trust": 0.9, "url": "http://xforce.iss.net/static/6083.php" }, { "trust": 0.9, "url": "http://xforce.iss.net/static/6135.php" }, { "trust": 0.9, "url": "http://xforce.iss.net/static/6063.php" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/5114" }, { "trust": 0.8, "url": "http://www.corest.com/files/files/11/crc32.pdf" }, { "trust": 0.8, "url": "http://www1.corest.com/common/showdoc.php?idx=131\u0026idxseccion=10" }, { "trust": 0.8, "url": "http://xforce.iss.net/static/6449.php" }, { "trust": 0.8, "url": "http://razor.bindview.com/publish/advisories/adv_ssh1crc.html" }, { "trust": 0.8, "url": "http://www1.corest.com/common/showdoc.php?idx=81\u0026idxsection=10#" }, { "trust": 0.8, "url": "http://www.openssh.com/security.html" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2347" }, { "trust": 0.8, "url": "http://www.ssh.com/products/ssh/advisories/ssh1_crc-32.cfm" }, { "trust": 0.8, "url": "http://xforce.iss.net/alerts/advise100.php" }, { "trust": 0.8, "url": "http://www.cryptnet.net/fcp/audit/pgp4pine/01.html" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2405" }, { "trust": 0.8, "url": "http://devrandom.net/lists/archives/2001/2/bugtraq/0383.html" }, { "trust": 0.8, "url": "http://security-archive.merton.ox.ac.uk/bugtraq-200102/0389.html" }, { "trust": 0.8, "url": "http://pgp4pine.flatline.de/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2335" }, { "trust": 0.8, "url": "http://www.securityfocus.com/archive/1/160452" }, { "trust": 0.8, "url": "http://xforce.iss.net/static/6472.php" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/6080" }, { "trust": 0.3, "url": "http://www.netscreen.com/index.html" }, { "trust": 0.3, "url": "http://www.netscreen.com/support/alerts/11_06_02.html" }, { "trust": 0.3, "url": "http://support.coresecurity.com/impact/exploits/56f46f9564b53fc1bca5bef469b60df7.html" }, { "trust": 0.3, "url": "/archive/1/298289" }, { "trust": 0.3, "url": "/archive/1/298274" }, { "trust": 0.3, "url": "/archive/1/298288" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6144.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6091.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6149.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6156.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6153.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6060.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6078.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6098.php" }, { "trust": 0.1, "url": "https://www.iss.net" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6103.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6130.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6109.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6073.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6061.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6064.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6043.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6069.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6114.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6097.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6145.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6099.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6151.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6132.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6148.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6070.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6118.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6115.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6062.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6092.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6105.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6046.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6157.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6076.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6111.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6143.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6045.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6104.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6124.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6082.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6116.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6077.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6152.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6079.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6084.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6133.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6160.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6080.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6044.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6089.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6162.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6137.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6112.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6147.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6090.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6117.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6094.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6056.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6110.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/alerts/vol-6_num-4.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6074.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6155.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6058.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6102.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6121.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6139.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6146.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6081.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6095.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6071.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6159.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6134.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6100.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/maillists/index.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6101.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6096.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6066.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6113.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6093.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6065.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6087.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6068.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/sensitive.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6072.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6158.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6142.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6067.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6161.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6136.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6075.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6131.php" }, { "trust": 0.1, "url": "http://xforce.iss.net/static/6163.php" } ], "sources": [ { "db": "CERT/CC", "id": "VU#290140" }, { "db": "CERT/CC", "id": "VU#13877" }, { "db": "CERT/CC", "id": "VU#25309" }, { "db": "CERT/CC", "id": "VU#945216" }, { "db": "CERT/CC", "id": "VU#566640" }, { "db": "CERT/CC", "id": "VU#651994" }, { "db": "CERT/CC", "id": "VU#315308" }, { "db": "BID", "id": "2347" }, { "db": "BID", "id": "5114" }, { "db": "PACKETSTORM", "id": "24431" }, { "db": "NVD", "id": "CVE-2001-0317" }, { "db": "CNNVD", "id": "CNNVD-200105-038" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#290140" }, { "db": "CERT/CC", "id": "VU#13877" }, { "db": "CERT/CC", "id": "VU#25309" }, { "db": "CERT/CC", "id": "VU#945216" }, { "db": "CERT/CC", "id": "VU#566640" }, { "db": "CERT/CC", "id": "VU#651994" }, { "db": "CERT/CC", "id": "VU#315308" }, { "db": "BID", "id": "2347" }, { "db": "BID", "id": "5114" }, { "db": "BID", "id": "2405" }, { "db": "PACKETSTORM", "id": "24431" }, { "db": "NVD", "id": "CVE-2001-0317" }, { "db": "CNNVD", "id": "CNNVD-200105-038" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-06-27T00:00:00", "db": "CERT/CC", "id": "VU#290140" }, { "date": "2001-11-07T00:00:00", "db": "CERT/CC", "id": "VU#13877" }, { "date": "2000-09-26T00:00:00", "db": "CERT/CC", "id": "VU#25309" }, { "date": "2001-10-24T00:00:00", "db": "CERT/CC", "id": "VU#945216" }, { "date": "2001-07-12T00:00:00", "db": "CERT/CC", "id": "VU#566640" }, { "date": "2001-05-16T00:00:00", "db": "CERT/CC", "id": "VU#651994" }, { "date": "2001-01-18T00:00:00", "db": "CERT/CC", "id": "VU#315308" }, { "date": "2001-02-08T00:00:00", "db": "BID", "id": "2347" }, { "date": "2002-06-27T00:00:00", "db": "BID", "id": "5114" }, { "date": "2001-02-20T00:00:00", "db": "BID", "id": "2405" }, { "date": "2001-03-13T23:54:42", "db": "PACKETSTORM", "id": "24431" }, { "date": "2001-05-03T04:00:00", "db": "NVD", "id": "CVE-2001-0317" }, { "date": "2001-05-03T00:00:00", "db": "CNNVD", "id": "CNNVD-200105-038" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-12-12T00:00:00", "db": "CERT/CC", "id": "VU#290140" }, { "date": "2003-05-20T00:00:00", "db": "CERT/CC", "id": "VU#13877" }, { "date": "2002-03-05T00:00:00", "db": "CERT/CC", "id": "VU#25309" }, { "date": "2003-05-20T00:00:00", "db": "CERT/CC", "id": "VU#945216" }, { "date": "2002-01-15T00:00:00", "db": "CERT/CC", "id": "VU#566640" }, { "date": "2001-06-26T00:00:00", "db": "CERT/CC", "id": "VU#651994" }, { "date": "2002-03-05T00:00:00", "db": "CERT/CC", "id": "VU#315308" }, { "date": "2001-02-08T00:00:00", "db": "BID", "id": "2347" }, { "date": "2002-06-27T00:00:00", "db": "BID", "id": "5114" }, { "date": "2001-02-20T00:00:00", "db": "BID", "id": "2405" }, { "date": "2017-10-10T01:29:40.687000", "db": "NVD", "id": "CVE-2001-0317" }, { "date": "2005-05-02T00:00:00", "db": "CNNVD", "id": "CNNVD-200105-038" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "2405" }, { "db": "CNNVD", "id": "CNNVD-200105-038" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Cisco products consume excessive CPU resources in response to large SSH packets", "sources": [ { "db": "CERT/CC", "id": "VU#290140" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Failure to Handle Exceptional Conditions", "sources": [ { "db": "BID", "id": "5114" }, { "db": "BID", "id": "2405" } ], "trust": 0.6 } }
ghsa-qr7m-wxwp-4hxg
Vulnerability from github
Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process.
{ "affected": [], "aliases": [ "CVE-2001-0317" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2001-05-03T04:00:00Z", "severity": "LOW" }, "details": "Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process.", "id": "GHSA-qr7m-wxwp-4hxg", "modified": "2022-04-30T18:15:49Z", "published": "2022-04-30T18:15:49Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2001-0317" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6080" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/bugtraq/2001-02/0267.html" }, { "type": "WEB", "url": "http://www.caldera.com/support/security/advisories/CSSA-2001-009.0.txt" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2001-013.html" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.