var-200102-0114
Vulnerability from variot
Buffer overflow in the text editor functionality in HP-UX 10.01 through 11.04 on HP9000 Series 700 and Series 800 allows local users to cause a denial of service ("system availability") via text editors such as (1) e, (2) ex, (3) vi, (4) edit, (5) view, and (6) vedit. A buffer overflow in the text editor on certain Hewlett-Packard systems could compromise system availability. Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. There is a remote integer overflow vulnerability in several implementations of the SSH1 protocol that allows an attacker to execute arbitrary code with the privileges of the SSH daemon, typically root. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root. While addressing vulnerabilities described in http://www.cisco.com/warp/public/707/SSH-multiple-pub.html, a denial of service condition has been inadvertently introduced into firmware upgrades. Firmware for routers and switches (IOS), Catalyst 6000 switches running CatOS, Cisco PIX Firewall and Cisco 11000 Content Service Switch devices may be vulnerable. Cisco has reported that scanning for SSH vulnerabilities on affected devices will cause excessive CPU consumption. The condition is due to a failure of the Cisco SSH implementation to properly process large SSH packets. Repeated and concurrent attacks may result in a denial of device service. As many of these devices are critical infrastructure components, more serious network outages may occur. Cisco has released upgrades that will eliminate this vulnerability. HP-UX is prone to a denial-of-service vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200102-0114", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": null, "scope": null, "trust": 3.2, "vendor": "ssh security", "version": null }, { "model": "catalyst csx", "scope": "eq", "trust": 2.4, "vendor": "cisco", "version": "60005.3" }, { "model": "hp-ux", "scope": "eq", "trust": 1.9, "vendor": "hp", "version": "10.24" }, { "model": "hp-ux", "scope": "eq", "trust": 1.9, "vendor": "hp", "version": "10.20" }, { "model": "hp-ux", "scope": "eq", "trust": 1.9, "vendor": "hp", "version": "10.10" }, { "model": null, "scope": null, "trust": 1.6, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 1.6, "vendor": "openssh", "version": null }, { "model": "hp-ux", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "11.00" }, { "model": "hp-ux", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "10.01" }, { "model": "hp-ux", "scope": "eq", "trust": 1.6, "vendor": "hp", "version": "11.04" }, { "model": "ios 12.1 ex", "scope": null, "trust": 1.2, "vendor": "cisco", "version": null }, { "model": "catalyst", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "60006.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "60005.5" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hewlett packard", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "core sdi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "freebsd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "smoothwall", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "holger lamm", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.0" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2" }, { "model": "ios 12.2yh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2ya", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xs", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xe", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2s", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2dd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2da", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2bc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2b", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2" }, { "model": "ios 12.1yi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1ye", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xp", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1ec", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1e", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0xv" }, { "model": "ios 12.0xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0st", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0sp", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0s", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "css11000 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60007.1(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60007.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.3(4)" }, { "model": "catalyst pan", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.3" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.2(0.111)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.2(0.110)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.1(2.13)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60006.1(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(13)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.5(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4.1" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4(4)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4(3)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4(2)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4(1)" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60005.4" }, { "model": "hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "11.0" }, { "model": "hp-ux b.11.04", "scope": null, "trust": 0.3, "vendor": "hp", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#268848" }, { "db": "CERT/CC", "id": "VU#290140" }, { "db": "CERT/CC", "id": "VU#13877" }, { "db": "CERT/CC", "id": "VU#25309" }, { "db": "CERT/CC", "id": "VU#945216" }, { "db": "CERT/CC", "id": "VU#566640" }, { "db": "CERT/CC", "id": "VU#315308" }, { "db": "BID", "id": "5114" }, { "db": "BID", "id": "88702" }, { "db": "CNNVD", "id": "CNNVD-200102-083" }, { "db": "NVD", "id": "CVE-2001-1439" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2001-1439" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Credited to Cisco Systems.", "sources": [ { "db": "BID", "id": "5114" } ], "trust": 0.3 }, "cve": "CVE-2001-1439", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/severity#" }, "@id": "https://www.variotdbs.pl/ref/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2001-1439", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2001-1439", "trust": 1.0, "value": "LOW" }, { "author": "CARNEGIE MELLON", "id": "VU#268848", "trust": 0.8, "value": "5.61" }, { "author": "CARNEGIE MELLON", "id": "VU#290140", "trust": 0.8, "value": "21.09" }, { "author": "CARNEGIE MELLON", "id": "VU#13877", "trust": 0.8, "value": "6.84" }, { "author": "CARNEGIE MELLON", "id": "VU#25309", "trust": 0.8, "value": "0.39" }, { "author": "CARNEGIE MELLON", "id": "VU#945216", "trust": 0.8, "value": "99.00" }, { "author": "CARNEGIE MELLON", "id": "VU#566640", "trust": 0.8, "value": "0.68" }, { "author": "CARNEGIE MELLON", "id": "VU#651994", "trust": 0.8, "value": "1.50" }, { "author": "CARNEGIE MELLON", "id": "VU#315308", "trust": 0.8, "value": "2.06" }, { "author": "CNNVD", "id": "CNNVD-200102-083", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#268848" }, { "db": "CERT/CC", "id": "VU#290140" }, { "db": "CERT/CC", "id": "VU#13877" }, { "db": "CERT/CC", "id": "VU#25309" }, { "db": "CERT/CC", "id": "VU#945216" }, { "db": "CERT/CC", "id": "VU#566640" }, { "db": "CERT/CC", "id": "VU#651994" }, { "db": "CERT/CC", "id": "VU#315308" }, { "db": "CNNVD", "id": "CNNVD-200102-083" }, { "db": "NVD", "id": "CVE-2001-1439" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in the text editor functionality in HP-UX 10.01 through 11.04 on HP9000 Series 700 and Series 800 allows local users to cause a denial of service (\"system availability\") via text editors such as (1) e, (2) ex, (3) vi, (4) edit, (5) view, and (6) vedit. A buffer overflow in the text editor on certain Hewlett-Packard systems could compromise system availability. Multiple Cisco networking products contain a denial-of-service vulnerability. There is an information integrity vulnerability in the SSH1 protocol that allows packets encrypted with a block cipher to be modified without notice. There is a remote integer overflow vulnerability in several implementations of the SSH1 protocol that allows an attacker to execute arbitrary code with the privileges of the SSH daemon, typically root. The program pgp4pine version 1.75.6 fails to properly identify expired keys when working with the Gnu Privacy Guard program (GnuPG). This failure may result in the clear-text transmission of senstive information when used with the PINE mail reading package. The SEDUM web server permits intruders to access files outside the web root. While addressing vulnerabilities described in http://www.cisco.com/warp/public/707/SSH-multiple-pub.html, a denial of service condition has been inadvertently introduced into firmware upgrades. Firmware for routers and switches (IOS), Catalyst 6000 switches running CatOS, Cisco PIX Firewall and Cisco 11000 Content Service Switch devices may be vulnerable. \nCisco has reported that scanning for SSH vulnerabilities on affected devices will cause excessive CPU consumption. The condition is due to a failure of the Cisco SSH implementation to properly process large SSH packets. \nRepeated and concurrent attacks may result in a denial of device service. As many of these devices are critical infrastructure components, more serious network outages may occur. \nCisco has released upgrades that will eliminate this vulnerability. HP-UX is prone to a denial-of-service vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2001-1439" }, { "db": "CERT/CC", "id": "VU#268848" }, { "db": "CERT/CC", "id": "VU#290140" }, { "db": "CERT/CC", "id": "VU#13877" }, { "db": "CERT/CC", "id": "VU#25309" }, { "db": "CERT/CC", "id": "VU#945216" }, { "db": "CERT/CC", "id": "VU#566640" }, { "db": "CERT/CC", "id": "VU#651994" }, { "db": "CERT/CC", "id": "VU#315308" }, { "db": "BID", "id": "5114" }, { "db": "BID", "id": "88702" } ], "trust": 7.2 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#13877", "trust": 3.2 }, { "db": "CERT/CC", "id": "VU#268848", "trust": 2.7 }, { "db": "CERT/CC", "id": "VU#945216", "trust": 2.4 }, { "db": "CERT/CC", "id": "VU#25309", "trust": 2.4 }, { "db": "AUSCERT", "id": "ESB-2001.066", "trust": 1.9 }, { "db": "NVD", "id": "CVE-2001-1439", "trust": 1.9 }, { "db": "BID", "id": "5114", "trust": 1.1 }, { "db": "XF", "id": "6111", "trust": 0.9 }, { "db": "CERT/CC", "id": "VU#290140", "trust": 0.8 }, { "db": "XF", "id": "6449", "trust": 0.8 }, { "db": "BID", "id": "2347", "trust": 0.8 }, { "db": "XF", "id": "6083", "trust": 0.8 }, { "db": "XF", "id": "6135", "trust": 0.8 }, { "db": "BID", "id": "2405", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#566640", "trust": 0.8 }, { "db": "BID", "id": "2335", "trust": 0.8 }, { "db": "XF", "id": "6063", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#651994", "trust": 0.8 }, { "db": "XF", "id": "6472", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#315308", "trust": 0.8 }, { "db": "HP", "id": "HPSBUX0011-132", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200102-083", "trust": 0.6 }, { "db": "BID", "id": "88702", "trust": 0.3 } ], "sources": [ { "db": "CERT/CC", "id": "VU#268848" }, { "db": "CERT/CC", "id": "VU#290140" }, { "db": "CERT/CC", "id": "VU#13877" }, { "db": "CERT/CC", "id": "VU#25309" }, { "db": "CERT/CC", "id": "VU#945216" }, { "db": "CERT/CC", "id": "VU#566640" }, { "db": "CERT/CC", "id": "VU#651994" }, { "db": "CERT/CC", "id": "VU#315308" }, { "db": "BID", "id": "5114" }, { "db": "BID", "id": "88702" }, { "db": "CNNVD", "id": "CNNVD-200102-083" }, { "db": "NVD", "id": "CVE-2001-1439" } ] }, "id": "VAR-200102-0114", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.9323857391666667 }, "last_update_date": "2022-05-06T22:18:22.186000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2001-1439" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.kb.cert.org/vuls/id/13877" }, { "trust": 2.4, "url": "http://www.ssh.com/products/ssh/cert/" }, { "trust": 1.9, "url": "http://www.auscert.org.au/render.html?it=1176" }, { "trust": 1.9, "url": "http://www.securityfocus.com/archive/1/163910" }, { "trust": 1.9, "url": "http://www.kb.cert.org/vuls/id/268848" }, { "trust": 1.6, "url": "http://www.cert.org/advisories/ca-2001-35.html" }, { "trust": 1.6, "url": "http://www.kb.cert.org/vuls/id/945216" }, { "trust": 1.6, "url": "http://www.kb.cert.org/vuls/id/25309" }, { "trust": 1.1, "url": "http://www.cisco.com/warp/public/707/ssh-scanning.shtml" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6111" }, { "trust": 0.9, "url": "http://xforce.iss.net/xforce/xfdb/6111" }, { "trust": 0.8, "url": "about vulnerability notes" }, { "trust": 0.8, "url": "contact us about this vulnerability" }, { "trust": 0.8, "url": "provide a vendor statement" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/5114" }, { "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/ssh-multiple-pub.html" }, { "trust": 0.8, "url": "http://www.corest.com/files/files/11/crc32.pdf" }, { "trust": 0.8, "url": "http://www1.corest.com/common/showdoc.php?idx=131\u0026idxseccion=10" }, { "trust": 0.8, "url": "http://xforce.iss.net/static/6449.php" }, { "trust": 0.8, "url": "http://razor.bindview.com/publish/advisories/adv_ssh1crc.html" }, { "trust": 0.8, "url": "http://www1.corest.com/common/showdoc.php?idx=81\u0026idxsection=10#" }, { "trust": 0.8, "url": "http://www.openssh.com/security.html" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2347" }, { "trust": 0.8, "url": "http://www.ssh.com/products/ssh/advisories/ssh1_crc-32.cfm" }, { "trust": 0.8, "url": "http://xforce.iss.net/static/6083.php" }, { "trust": 0.8, "url": "http://xforce.iss.net/alerts/advise100.php" }, { "trust": 0.8, "url": "http://www.cryptnet.net/fcp/audit/pgp4pine/01.html" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2405" }, { "trust": 0.8, "url": "http://xforce.iss.net/static/6135.php" }, { "trust": 0.8, "url": "http://devrandom.net/lists/archives/2001/2/bugtraq/0383.html" }, { "trust": 0.8, "url": "http://security-archive.merton.ox.ac.uk/bugtraq-200102/0389.html" }, { "trust": 0.8, "url": "http://pgp4pine.flatline.de/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/2335" }, { "trust": 0.8, "url": "http://xforce.iss.net/static/6063.php" }, { "trust": 0.8, "url": "http://www.securityfocus.com/archive/1/160452" }, { "trust": 0.8, "url": "http://xforce.iss.net/static/6472.php" } ], "sources": [ { "db": "CERT/CC", "id": "VU#268848" }, { "db": "CERT/CC", "id": "VU#290140" }, { "db": "CERT/CC", "id": "VU#13877" }, { "db": "CERT/CC", "id": "VU#25309" }, { "db": "CERT/CC", "id": "VU#945216" }, { "db": "CERT/CC", "id": "VU#566640" }, { "db": "CERT/CC", "id": "VU#651994" }, { "db": "CERT/CC", "id": "VU#315308" }, { "db": "BID", "id": "5114" }, { "db": "BID", "id": "88702" }, { "db": "CNNVD", "id": "CNNVD-200102-083" }, { "db": "NVD", "id": "CVE-2001-1439" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#268848" }, { "db": "CERT/CC", "id": "VU#290140" }, { "db": "CERT/CC", "id": "VU#13877" }, { "db": "CERT/CC", "id": "VU#25309" }, { "db": "CERT/CC", "id": "VU#945216" }, { "db": "CERT/CC", "id": "VU#566640" }, { "db": "CERT/CC", "id": "VU#651994" }, { "db": "CERT/CC", "id": "VU#315308" }, { "db": "BID", "id": "5114" }, { "db": "BID", "id": "88702" }, { "db": "CNNVD", "id": "CNNVD-200102-083" }, { "db": "NVD", "id": "CVE-2001-1439" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2001-05-04T00:00:00", "db": "CERT/CC", "id": "VU#268848" }, { "date": "2002-06-27T00:00:00", "db": "CERT/CC", "id": "VU#290140" }, { "date": "2001-11-07T00:00:00", "db": "CERT/CC", "id": "VU#13877" }, { "date": "2000-09-26T00:00:00", "db": "CERT/CC", "id": "VU#25309" }, { "date": "2001-10-24T00:00:00", "db": "CERT/CC", "id": "VU#945216" }, { "date": "2001-07-12T00:00:00", "db": "CERT/CC", "id": "VU#566640" }, { "date": "2001-05-16T00:00:00", "db": "CERT/CC", "id": "VU#651994" }, { "date": "2001-01-18T00:00:00", "db": "CERT/CC", "id": "VU#315308" }, { "date": "2002-06-27T00:00:00", "db": "BID", "id": "5114" }, { "date": "2001-02-16T00:00:00", "db": "BID", "id": "88702" }, { "date": "2001-02-16T00:00:00", "db": "CNNVD", "id": "CNNVD-200102-083" }, { "date": "2001-02-16T05:00:00", "db": "NVD", "id": "CVE-2001-1439" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2001-08-10T00:00:00", "db": "CERT/CC", "id": "VU#268848" }, { "date": "2002-12-12T00:00:00", "db": "CERT/CC", "id": "VU#290140" }, { "date": "2003-05-20T00:00:00", "db": "CERT/CC", "id": "VU#13877" }, { "date": "2002-03-05T00:00:00", "db": "CERT/CC", "id": "VU#25309" }, { "date": "2003-05-20T00:00:00", "db": "CERT/CC", "id": "VU#945216" }, { "date": "2002-01-15T00:00:00", "db": "CERT/CC", "id": "VU#566640" }, { "date": "2001-06-26T00:00:00", "db": "CERT/CC", "id": "VU#651994" }, { "date": "2002-03-05T00:00:00", "db": "CERT/CC", "id": "VU#315308" }, { "date": "2002-06-27T00:00:00", "db": "BID", "id": "5114" }, { "date": "2001-02-16T00:00:00", "db": "BID", "id": "88702" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200102-083" }, { "date": "2017-07-11T01:29:00", "db": "NVD", "id": "CVE-2001-1439" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "88702" }, { "db": "CNNVD", "id": "CNNVD-200102-083" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Hewlett Packard HP-UX text editors contain buffer overflow", "sources": [ { "db": "CERT/CC", "id": "VU#268848" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200102-083" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.