ID CVE-2001-0825
Summary Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check.
References
Vulnerable Configurations
  • cpe:2.3:a:xinetd:xinetd:2.1.8.8:*:*:*:*:*:*:*
    cpe:2.3:a:xinetd:xinetd:2.1.8.8:*:*:*:*:*:*:*
  • cpe:2.3:a:xinetd:xinetd:2.1.8.9:*:*:*:*:*:*:*
    cpe:2.3:a:xinetd:xinetd:2.1.8.9:*:*:*:*:*:*:*
  • cpe:2.3:a:xinetd:xinetd:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:xinetd:xinetd:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:xinetd:xinetd:-:*:*:*:*:*:*:*
    cpe:2.3:a:xinetd:xinetd:-:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 03-05-2018 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
redhat via4
advisories
rhsa
id RHSA-2001:092
refmap via4
bid 2971
conectiva CLA-2001:406
immunix IMNX-2001-70-029-01
suse SuSE-SA:2001:022
xf xinetd-zero-length-bo(6804)
Last major update 03-05-2018 - 01:29
Published 06-12-2001 - 05:00
Last modified 03-05-2018 - 01:29
Back to Top