Vulnerabilites related to caldera - openlinux_edesktop
Vulnerability from fkie_nvd
Published
2001-08-31 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
telnet daemon (telnetd) from the Linux netkit package before netkit-telnet-0.16 allows remote attackers to bypass authentication when telnetd is running with the -L command line option.
Impacted products
Vendor Product Version
caldera openlinux_edesktop 2.3
caldera openlinux_eserver 2.3



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_edesktop:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3F7AE75-0E35-4D41-9949-30FDE0425CC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BE526D3-4CD8-423C-81FA-65B92F862A5E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "telnet daemon (telnetd) from the Linux netkit package before netkit-telnet-0.16 allows remote attackers to bypass authentication when telnetd is running with the -L command line option.",
      },
   ],
   id: "CVE-2000-1195",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2001-08-31T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.caldera.com/support/security/advisories/CSSA-2000-008.0.txt",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/4225",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.caldera.com/support/security/advisories/CSSA-2000-008.0.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/4225",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2001-01-09 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
References
cve@mitre.orgftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.ascPatch, Vendor Advisory
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20011103-02-P
cve@mitre.orghttp://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html
cve@mitre.orghttp://archives.neohapsis.com/archives/tru64/2002-q1/0009.html
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354
cve@mitre.orghttp://marc.info/?l=bugtraq&m=97561816504170&w=2
cve@mitre.orghttp://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt
cve@mitre.orghttp://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt
cve@mitre.orghttp://www.debian.org/security/2000/20001111a
cve@mitre.orghttp://www.kb.cert.org/vuls/id/10277US Government Resource
cve@mitre.orghttp://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3
cve@mitre.orghttp://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2000-117.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2000-121.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/146657
cve@mitre.orghttp://www.securityfocus.com/bid/1926
cve@mitre.orghttp://www.securityfocus.com/bid/2006Exploit, Patch, Vendor Advisory
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.ascPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=97561816504170&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt
af854a3a-2127-422b-91ae-364da2661108http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2000/20001111a
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/10277US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3
af854a3a-2127-422b-91ae-364da2661108http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2000-117.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2000-121.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/146657
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/1926
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/2006Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:immunix:immunix:6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB0F79BE-8EBF-44D8-83A1-9331669BED54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "48F068BE-F5B3-4E43-8E6A-24AB4D2DEDF0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:4.0es:*:*:*:*:*:*:*",
                     matchCriteriaId: "6529EC98-7CF7-47A1-95BB-2F34066FE95D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFDAB801-AAA0-4B3B-B488-52E7BA8650C5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "612AC3B1-8E55-437F-9600-67EA1A8BAD48",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "537A5C29-D770-4755-A6AB-8916754E14DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3AC05A9-04DA-4ED3-94D8-3254384CB724",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EC3F7E5-5D49-471B-A705-ADD2642E5B46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B211BCBF-CB17-4D32-B6FE-A34D86C4FBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BE526D3-4CD8-423C-81FA-65B92F862A5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDD9BE2B-7255-4FC1-B452-E8370632B03F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D323A6B7-2741-4F31-B0D6-5D6FB738A2A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACAAD334-2CA7-4B3B-BA25-302E7610BC2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4853E92-5E0A-47B9-A343-D5BEE87D2C27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC1FF5D-5EAB-44D5-B281-770547C70D68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8FBD5A-2FD0-43CD-AC4B-1D6984D336FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8EED385-8C39-4A40-A507-2EFE7652FB35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DFA94D5-0139-490C-8257-0751FE9FBAE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EC4D3AB-38FA-4D44-AF5C-2DCD15994E76",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0633B5A6-7A88-4A96-9462-4C09D124ED36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:6.2e:*:*:*:*:*:*:*",
                     matchCriteriaId: "24EEDE00-6F40-4A9A-BF74-6BE6CEAE39E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9E7D75A-333E-4C63-9593-F64ABA5D1CE3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.",
      },
   ],
   id: "CVE-2000-1134",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2001-01-09T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc",
      },
      {
         source: "cve@mitre.org",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P",
      },
      {
         source: "cve@mitre.org",
         url: "http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350",
      },
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354",
      },
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=97561816504170&w=2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2000/20001111a",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/10277",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2000-117.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2000-121.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/archive/1/146657",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/1926",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/2006",
      },
      {
         source: "cve@mitre.org",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=97561816504170&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2000/20001111a",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.kb.cert.org/vuls/id/10277",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2000-117.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2000-121.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/archive/1/146657",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/1926",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/2006",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2000-12-19 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:caldera:openlinux_ebuilder:3.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E02719FF-924A-4E96-AE1D-5994A8D4275E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EC3F7E5-5D49-471B-A705-ADD2642E5B46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B211BCBF-CB17-4D32-B6FE-A34D86C4FBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BE526D3-4CD8-423C-81FA-65B92F862A5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "29B186E5-7C2F-466E-AA4A-8F2B618F8A14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:1.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DF1A678-FEF1-4549-8EDC-518444CFC57F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:trustix:secure_linux:1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D0DFB12-B43F-4207-A900-464A97F5124D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.",
      },
   ],
   id: "CVE-2000-0917",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2000-12-19T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:56.lprng.asc",
      },
      {
         source: "cve@mitre.org",
         url: "http://archives.neohapsis.com/archives/bugtraq/2000-09/0293.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-033.0.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.cert.org/advisories/CA-2000-22.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2000-065.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/1712",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5287",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:56.lprng.asc",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://archives.neohapsis.com/archives/bugtraq/2000-09/0293.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-033.0.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "US Government Resource",
         ],
         url: "http://www.cert.org/advisories/CA-2000-22.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2000-065.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/1712",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5287",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2000-07-04 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
BitchX IRC client does not properly cleanse an untrusted format string, which allows remote attackers to cause a denial of service via an invite to a channel whose name includes special formatting characters.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/bugtraq/2000-07/0026.html
cve@mitre.orghttp://archives.neohapsis.com/archives/bugtraq/2000-07/0098.html
cve@mitre.orghttp://archives.neohapsis.com/archives/bugtraq/2000-07/0105.html
cve@mitre.orghttp://archives.neohapsis.com/archives/freebsd/2000-07/0042.html
cve@mitre.orghttp://archives.neohapsis.com/archives/vuln-dev/2000-q3/0018.html
cve@mitre.orghttp://www.calderasystems.com/support/security/advisories/CSSA-2000-022.0.txt
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2000-042.html
cve@mitre.orghttp://www.securityfocus.com/bid/1436
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/4897
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2000-07/0026.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2000-07/0098.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2000-07/0105.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/freebsd/2000-07/0042.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0018.html
af854a3a-2127-422b-91ae-364da2661108http://www.calderasystems.com/support/security/advisories/CSSA-2000-022.0.txt
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2000-042.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/1436
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/4897



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:caldera:openlinux_desktop:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "39CEEC92-B7FE-4E41-9966-DDA9EDF943C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:caldera:openlinux_ebuilder:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4B1F951-6F13-4FFF-84F7-0E65A689DB64",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B211BCBF-CB17-4D32-B6FE-A34D86C4FBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BE526D3-4CD8-423C-81FA-65B92F862A5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E02BE6-4800-4940-B269-385B66AC5077",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0A585A1-FF82-418F-90F8-072458DB7816",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*",
                     matchCriteriaId: "02362C25-B373-4FB1-AF4A-2AFC7F7D4387",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "BitchX IRC client does not properly cleanse an untrusted format string, which allows remote attackers to cause a denial of service via an invite to a channel whose name includes special formatting characters.",
      },
   ],
   id: "CVE-2000-0594",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2000-07-04T04:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0026.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0098.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0105.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://archives.neohapsis.com/archives/freebsd/2000-07/0042.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0018.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-022.0.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2000-042.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/1436",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/4897",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0026.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0098.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0105.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://archives.neohapsis.com/archives/freebsd/2000-07/0042.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0018.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-022.0.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2000-042.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/1436",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/4897",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2001-03-12 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
inn 2.2.3 allows local users to overwrite arbitrary files via a symlink attack in some configurations.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:caldera:openlinux_desktop:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "39CEEC92-B7FE-4E41-9966-DDA9EDF943C1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:immunix:immunix:7.0_beta:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A2889C6-8DE0-4432-812A-F2A5C4A08897",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B211BCBF-CB17-4D32-B6FE-A34D86C4FBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BE526D3-4CD8-423C-81FA-65B92F862A5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "58B90124-0543-4226-BFF4-13CCCBCCB243",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:2.2:*:68k:*:*:*:*:*",
                     matchCriteriaId: "E040A866-0D2C-40E1-B1FB-DB600B389E27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:*",
                     matchCriteriaId: "CE1C944A-E5F1-49DE-B069-2A358123B535",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:2.2:*:arm:*:*:*:*:*",
                     matchCriteriaId: "D71083B4-1736-4501-8DE8-BC24AC1447AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:*",
                     matchCriteriaId: "AAEE18D8-AA3B-47A3-AA7C-AAFF7591F391",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D323A6B7-2741-4F31-B0D6-5D6FB738A2A1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACAAD334-2CA7-4B3B-BA25-302E7610BC2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4853E92-5E0A-47B9-A343-D5BEE87D2C27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC1FF5D-5EAB-44D5-B281-770547C70D68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8FBD5A-2FD0-43CD-AC4B-1D6984D336FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "29B186E5-7C2F-466E-AA4A-8F2B618F8A14",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "inn 2.2.3 allows local users to overwrite arbitrary files via a symlink attack in some configurations.",
      },
   ],
   id: "CVE-2001-0139",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "HIGH",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 1.2,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:L/AC:H/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 1.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2001-03-12T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://marc.info/?l=bugtraq&m=97916374410647&w=2",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-001.0.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-010.php3",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/2190",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5916",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://marc.info/?l=bugtraq&m=97916374410647&w=2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-001.0.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-010.php3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/2190",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5916",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2001-03-26 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Format string vulnerability in the error logging code of DHCP server and client in Caldera Linux allows remote attackers to execute arbitrary commands.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:caldera:openlinux_desktop:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "39CEEC92-B7FE-4E41-9966-DDA9EDF943C1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B211BCBF-CB17-4D32-B6FE-A34D86C4FBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_eserver:2.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D11E0075-50CD-4A16-9A89-56DEF5263BCF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Format string vulnerability in the error logging code of DHCP server and client in Caldera Linux allows remote attackers to execute arbitrary commands.",
      },
   ],
   id: "CVE-2001-0181",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 10,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 10,
            obtainAllPrivilege: true,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2001-03-26T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-003.0.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/2215",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5953",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-003.0.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.securityfocus.com/bid/2215",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5953",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2001-03-26 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
kdesu program in KDE2 (KDE before 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:conectiva:linux:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCE4BBA3-7332-45EE-8C29-BE5A473B559D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B211BCBF-CB17-4D32-B6FE-A34D86C4FBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "ACAAD334-2CA7-4B3B-BA25-302E7610BC2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4853E92-5E0A-47B9-A343-D5BEE87D2C27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "3EC1FF5D-5EAB-44D5-B281-770547C70D68",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A8FBD5A-2FD0-43CD-AC4B-1D6984D336FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "97E09AD9-F057-4264-88BB-A8A18C1B1246",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "F163E145-09F7-4BE2-9B46-5B6713070BAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "124E1802-7984-45ED-8A92-393FC20662FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B67020A-6942-4478-B501-764147C4970D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AD0FF64-05DF-48C2-9BB5-FD993121FB2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7786607A-362E-4817-A17E-C76D6A1F737D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9E7D75A-333E-4C63-9593-F64ABA5D1CE3",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "kdesu program in KDE2 (KDE before 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges.",
      },
   ],
   id: "CVE-2001-0178",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 2.1,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2001-03-26T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-005.0.txt",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-018.php3?dis=7.2",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2001_002_kdesu_txt.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5995",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-005.0.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-018.php3?dis=7.2",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2001_002_kdesu_txt.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5995",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2001-12-06 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:caldera:openlinux_server:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A218B67-B87B-4A5E-B9EF-EF39ADEAD9FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:caldera:openlinux_workstation:3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB41DE44-C3A1-4CC9-ACA7-4EC171D68910",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux:2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "23B38FCC-2C86-4E84-860B-EBAE0FA123B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B211BCBF-CB17-4D32-B6FE-A34D86C4FBF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:caldera:openlinux_eserver:2.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D11E0075-50CD-4A16-9A89-56DEF5263BCF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "146F7A77-A950-4CAD-BDA9-C239696F569D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C24A129D-2E5E-436C-95DE-AE75D2E8D092",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0AD0FF64-05DF-48C2-9BB5-FD993121FB2E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7786607A-362E-4817-A17E-C76D6A1F737D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9E7D75A-333E-4C63-9593-F64ABA5D1CE3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "819868A7-EB1E-4CA9-8D71-72F194E5EFEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0519FF7D-363E-4530-9E63-6EA3E88432DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAE3FF4F-646F-4E05-A08A-C9399DEF60F1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.",
      },
   ],
   id: "CVE-2001-0851",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2001-12-06T05:00:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000432",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.caldera.com/support/security/advisories/CSSA-2001-038.0.txt",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-082.php3",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.linuxsecurity.com/advisories/other_advisory-1683.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.novell.com/linux/security/advisories/2001_039_kernel2_txt.html",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.redhat.com/support/errata/RHSA-2001-142.html",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7461",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000432",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.caldera.com/support/security/advisories/CSSA-2001-038.0.txt",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-082.php3",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://www.linuxsecurity.com/advisories/other_advisory-1683.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.novell.com/linux/security/advisories/2001_039_kernel2_txt.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.redhat.com/support/errata/RHSA-2001-142.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7461",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2000-0594
Vulnerability from cvelistv5
Published
2000-10-13 04:00
Modified
2024-08-08 05:21
Severity ?
Summary
BitchX IRC client does not properly cleanse an untrusted format string, which allows remote attackers to cause a denial of service via an invite to a channel whose name includes special formatting characters.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T05:21:31.570Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "FreeBSD-SA-00:32",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FREEBSD",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/freebsd/2000-07/0042.html",
               },
               {
                  name: "20000707 BitchX update",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0105.html",
               },
               {
                  name: "RHSA-2000:042",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2000-042.html",
               },
               {
                  name: "CSSA-2000-022.0",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CALDERA",
                     "x_transferred",
                  ],
                  url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-022.0.txt",
               },
               {
                  name: "1436",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/1436",
               },
               {
                  name: "irc-bitchx-invite-dos(4897)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/4897",
               },
               {
                  name: "20000704 BitchX exploit possibly waiting to happen, certain DoS",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0026.html",
               },
               {
                  name: "20000707 CONECTIVA LINUX SECURITY ANNOUNCEMENT - BitchX",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0098.html",
               },
               {
                  name: "20000704 BitchX /ignore bug",
                  tags: [
                     "mailing-list",
                     "x_refsource_VULN-DEV",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0018.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2000-07-05T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "BitchX IRC client does not properly cleanse an untrusted format string, which allows remote attackers to cause a denial of service via an invite to a channel whose name includes special formatting characters.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2004-09-02T09:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "FreeBSD-SA-00:32",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FREEBSD",
               ],
               url: "http://archives.neohapsis.com/archives/freebsd/2000-07/0042.html",
            },
            {
               name: "20000707 BitchX update",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0105.html",
            },
            {
               name: "RHSA-2000:042",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2000-042.html",
            },
            {
               name: "CSSA-2000-022.0",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CALDERA",
               ],
               url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-022.0.txt",
            },
            {
               name: "1436",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/1436",
            },
            {
               name: "irc-bitchx-invite-dos(4897)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/4897",
            },
            {
               name: "20000704 BitchX exploit possibly waiting to happen, certain DoS",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0026.html",
            },
            {
               name: "20000707 CONECTIVA LINUX SECURITY ANNOUNCEMENT - BitchX",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0098.html",
            },
            {
               name: "20000704 BitchX /ignore bug",
               tags: [
                  "mailing-list",
                  "x_refsource_VULN-DEV",
               ],
               url: "http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0018.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2000-0594",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "BitchX IRC client does not properly cleanse an untrusted format string, which allows remote attackers to cause a denial of service via an invite to a channel whose name includes special formatting characters.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "FreeBSD-SA-00:32",
                     refsource: "FREEBSD",
                     url: "http://archives.neohapsis.com/archives/freebsd/2000-07/0042.html",
                  },
                  {
                     name: "20000707 BitchX update",
                     refsource: "BUGTRAQ",
                     url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0105.html",
                  },
                  {
                     name: "RHSA-2000:042",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2000-042.html",
                  },
                  {
                     name: "CSSA-2000-022.0",
                     refsource: "CALDERA",
                     url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-022.0.txt",
                  },
                  {
                     name: "1436",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/1436",
                  },
                  {
                     name: "irc-bitchx-invite-dos(4897)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/4897",
                  },
                  {
                     name: "20000704 BitchX exploit possibly waiting to happen, certain DoS",
                     refsource: "BUGTRAQ",
                     url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0026.html",
                  },
                  {
                     name: "20000707 CONECTIVA LINUX SECURITY ANNOUNCEMENT - BitchX",
                     refsource: "BUGTRAQ",
                     url: "http://archives.neohapsis.com/archives/bugtraq/2000-07/0098.html",
                  },
                  {
                     name: "20000704 BitchX /ignore bug",
                     refsource: "VULN-DEV",
                     url: "http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0018.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2000-0594",
      datePublished: "2000-10-13T04:00:00",
      dateReserved: "2000-07-19T00:00:00",
      dateUpdated: "2024-08-08T05:21:31.570Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2001-0851
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 04:37
Severity ?
Summary
Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T04:37:06.400Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "MDKSA-2001:082",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-082.php3",
               },
               {
                  name: "linux-syncookie-bypass-filter(7461)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7461",
               },
               {
                  name: "SuSE-SA:2001:039",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2001_039_kernel2_txt.html",
               },
               {
                  name: "RHSA-2001:142",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2001-142.html",
               },
               {
                  name: "ESA-20011106-01",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_ENGARDE",
                     "x_transferred",
                  ],
                  url: "http://www.linuxsecurity.com/advisories/other_advisory-1683.html",
               },
               {
                  name: "CSSA-2001-38.0",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CALDERA",
                     "x_transferred",
                  ],
                  url: "http://www.caldera.com/support/security/advisories/CSSA-2001-038.0.txt",
               },
               {
                  name: "CLA-2001:432",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000432",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2001-11-02T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2002-02-26T00:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "MDKSA-2001:082",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-082.php3",
            },
            {
               name: "linux-syncookie-bypass-filter(7461)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7461",
            },
            {
               name: "SuSE-SA:2001:039",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2001_039_kernel2_txt.html",
            },
            {
               name: "RHSA-2001:142",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2001-142.html",
            },
            {
               name: "ESA-20011106-01",
               tags: [
                  "vendor-advisory",
                  "x_refsource_ENGARDE",
               ],
               url: "http://www.linuxsecurity.com/advisories/other_advisory-1683.html",
            },
            {
               name: "CSSA-2001-38.0",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CALDERA",
               ],
               url: "http://www.caldera.com/support/security/advisories/CSSA-2001-038.0.txt",
            },
            {
               name: "CLA-2001:432",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000432",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2001-0851",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "MDKSA-2001:082",
                     refsource: "MANDRAKE",
                     url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-082.php3",
                  },
                  {
                     name: "linux-syncookie-bypass-filter(7461)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7461",
                  },
                  {
                     name: "SuSE-SA:2001:039",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2001_039_kernel2_txt.html",
                  },
                  {
                     name: "RHSA-2001:142",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2001-142.html",
                  },
                  {
                     name: "ESA-20011106-01",
                     refsource: "ENGARDE",
                     url: "http://www.linuxsecurity.com/advisories/other_advisory-1683.html",
                  },
                  {
                     name: "CSSA-2001-38.0",
                     refsource: "CALDERA",
                     url: "http://www.caldera.com/support/security/advisories/CSSA-2001-038.0.txt",
                  },
                  {
                     name: "CLA-2001:432",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000432",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2001-0851",
      datePublished: "2002-03-09T05:00:00",
      dateReserved: "2001-11-22T00:00:00",
      dateUpdated: "2024-08-08T04:37:06.400Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2001-0139
Vulnerability from cvelistv5
Published
2001-05-07 04:00
Modified
2024-08-08 04:06
Severity ?
Summary
inn 2.2.3 allows local users to overwrite arbitrary files via a symlink attack in some configurations.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T04:06:55.545Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20010110 Immunix OS Security update for lots of temp file problems",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=97916374410647&w=2",
               },
               {
                  name: "linux-inn-symlink(5916)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5916",
               },
               {
                  name: "MDKSA-2001:010",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-010.php3",
               },
               {
                  name: "2190",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/2190",
               },
               {
                  name: "CSSA-2001-001.0",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CALDERA",
                     "x_transferred",
                  ],
                  url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-001.0.txt",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2001-01-10T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "inn 2.2.3 allows local users to overwrite arbitrary files via a symlink attack in some configurations.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2005-11-02T10:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20010110 Immunix OS Security update for lots of temp file problems",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=97916374410647&w=2",
            },
            {
               name: "linux-inn-symlink(5916)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5916",
            },
            {
               name: "MDKSA-2001:010",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-010.php3",
            },
            {
               name: "2190",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/2190",
            },
            {
               name: "CSSA-2001-001.0",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CALDERA",
               ],
               url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-001.0.txt",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2001-0139",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "inn 2.2.3 allows local users to overwrite arbitrary files via a symlink attack in some configurations.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20010110 Immunix OS Security update for lots of temp file problems",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=97916374410647&w=2",
                  },
                  {
                     name: "linux-inn-symlink(5916)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5916",
                  },
                  {
                     name: "MDKSA-2001:010",
                     refsource: "MANDRAKE",
                     url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-010.php3",
                  },
                  {
                     name: "2190",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/2190",
                  },
                  {
                     name: "CSSA-2001-001.0",
                     refsource: "CALDERA",
                     url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-001.0.txt",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2001-0139",
      datePublished: "2001-05-07T04:00:00",
      dateReserved: "2001-02-06T00:00:00",
      dateUpdated: "2024-08-08T04:06:55.545Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2001-0178
Vulnerability from cvelistv5
Published
2001-05-07 04:00
Modified
2024-08-08 04:14
Severity ?
Summary
kdesu program in KDE2 (KDE before 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T04:14:06.573Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "SuSE-SA:2001:02",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2001_002_kdesu_txt.html",
               },
               {
                  name: "CSSA-2001-005.0",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CALDERA",
                     "x_transferred",
                  ],
                  url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-005.0.txt",
               },
               {
                  name: "MDKSA-2001:018",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-018.php3?dis=7.2",
               },
               {
                  name: "kde2-kdesu-retrieve-passwords(5995)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5995",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2001-01-23T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "kdesu program in KDE2 (KDE before 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2005-11-02T10:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "SuSE-SA:2001:02",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2001_002_kdesu_txt.html",
            },
            {
               name: "CSSA-2001-005.0",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CALDERA",
               ],
               url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-005.0.txt",
            },
            {
               name: "MDKSA-2001:018",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-018.php3?dis=7.2",
            },
            {
               name: "kde2-kdesu-retrieve-passwords(5995)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5995",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2001-0178",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "kdesu program in KDE2 (KDE before 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "SuSE-SA:2001:02",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2001_002_kdesu_txt.html",
                  },
                  {
                     name: "CSSA-2001-005.0",
                     refsource: "CALDERA",
                     url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-005.0.txt",
                  },
                  {
                     name: "MDKSA-2001:018",
                     refsource: "MANDRAKE",
                     url: "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-018.php3?dis=7.2",
                  },
                  {
                     name: "kde2-kdesu-retrieve-passwords(5995)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5995",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2001-0178",
      datePublished: "2001-05-07T04:00:00",
      dateReserved: "2001-03-08T00:00:00",
      dateUpdated: "2024-08-08T04:14:06.573Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2000-1134
Vulnerability from cvelistv5
Published
2000-12-19 05:00
Modified
2024-08-08 05:45
Severity ?
Summary
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
References
http://www.debian.org/security/2000/20001111avendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/bid/1926vdb-entry, x_refsource_BID
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350vendor-advisory, x_refsource_CONECTIVA
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047vdb-entry, signature, x_refsource_OVAL
http://archives.neohapsis.com/archives/tru64/2002-q1/0009.htmlvendor-advisory, x_refsource_COMPAQ
http://www.securityfocus.com/bid/2006vdb-entry, x_refsource_BID
http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3vendor-advisory, x_refsource_MANDRAKE
http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txtvendor-advisory, x_refsource_CALDERA
http://www.redhat.com/support/errata/RHSA-2000-117.htmlvendor-advisory, x_refsource_REDHAT
http://www.kb.cert.org/vuls/id/10277third-party-advisory, x_refsource_CERT-VN
http://marc.info/?l=bugtraq&m=97561816504170&w=2mailing-list, x_refsource_BUGTRAQ
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.ascvendor-advisory, x_refsource_FREEBSD
http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.htmlmailing-list, x_refsource_BUGTRAQ
http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3vendor-advisory, x_refsource_MANDRAKE
http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txtvendor-advisory, x_refsource_CALDERA
ftp://patches.sgi.com/support/free/security/advisories/20011103-02-Pvendor-advisory, x_refsource_SGI
http://www.securityfocus.com/archive/1/146657mailing-list, x_refsource_BUGTRAQ
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354vendor-advisory, x_refsource_CONECTIVA
http://www.redhat.com/support/errata/RHSA-2000-121.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T05:45:37.043Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20001111a",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2000/20001111a",
               },
               {
                  name: "1926",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/1926",
               },
               {
                  name: "CLA-2000:350",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350",
               },
               {
                  name: "oval:org.mitre.oval:def:4047",
                  tags: [
                     "vdb-entry",
                     "signature",
                     "x_refsource_OVAL",
                     "x_transferred",
                  ],
                  url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047",
               },
               {
                  name: "SSRT1-41U",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_COMPAQ",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html",
               },
               {
                  name: "2006",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/2006",
               },
               {
                  name: "MDKSA-2000-069",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3",
               },
               {
                  name: "CSSA-2000-042.0",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CALDERA",
                     "x_transferred",
                  ],
                  url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt",
               },
               {
                  name: "RHSA-2000:117",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2000-117.html",
               },
               {
                  name: "VU#10277",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "http://www.kb.cert.org/vuls/id/10277",
               },
               {
                  name: "20001130 [ADV/EXP]: RH6.x root from bash /tmp vuln + MORE",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=97561816504170&w=2",
               },
               {
                  name: "FreeBSD-SA-00:76",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FREEBSD",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc",
               },
               {
                  name: "20001028 tcsh: unsafe tempfile in << redirects",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html",
               },
               {
                  name: "MDKSA-2000:075",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3",
               },
               {
                  name: "CSSA-2000-043.0",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CALDERA",
                     "x_transferred",
                  ],
                  url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt",
               },
               {
                  name: "20011103-02-P",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SGI",
                     "x_transferred",
                  ],
                  url: "ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P",
               },
               {
                  name: "20001128  /bin/sh creates insecure tmp files",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/archive/1/146657",
               },
               {
                  name: "CLSA-2000:354",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CONECTIVA",
                     "x_transferred",
                  ],
                  url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354",
               },
               {
                  name: "RHSA-2000:121",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2000-121.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2000-10-28T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-10-18T16:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "20001111a",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2000/20001111a",
            },
            {
               name: "1926",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/1926",
            },
            {
               name: "CLA-2000:350",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350",
            },
            {
               name: "oval:org.mitre.oval:def:4047",
               tags: [
                  "vdb-entry",
                  "signature",
                  "x_refsource_OVAL",
               ],
               url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047",
            },
            {
               name: "SSRT1-41U",
               tags: [
                  "vendor-advisory",
                  "x_refsource_COMPAQ",
               ],
               url: "http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html",
            },
            {
               name: "2006",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/2006",
            },
            {
               name: "MDKSA-2000-069",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3",
            },
            {
               name: "CSSA-2000-042.0",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CALDERA",
               ],
               url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt",
            },
            {
               name: "RHSA-2000:117",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2000-117.html",
            },
            {
               name: "VU#10277",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "http://www.kb.cert.org/vuls/id/10277",
            },
            {
               name: "20001130 [ADV/EXP]: RH6.x root from bash /tmp vuln + MORE",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=97561816504170&w=2",
            },
            {
               name: "FreeBSD-SA-00:76",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FREEBSD",
               ],
               url: "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc",
            },
            {
               name: "20001028 tcsh: unsafe tempfile in << redirects",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html",
            },
            {
               name: "MDKSA-2000:075",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3",
            },
            {
               name: "CSSA-2000-043.0",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CALDERA",
               ],
               url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt",
            },
            {
               name: "20011103-02-P",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SGI",
               ],
               url: "ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P",
            },
            {
               name: "20001128  /bin/sh creates insecure tmp files",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://www.securityfocus.com/archive/1/146657",
            },
            {
               name: "CLSA-2000:354",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CONECTIVA",
               ],
               url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354",
            },
            {
               name: "RHSA-2000:121",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2000-121.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2000-1134",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20001111a",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2000/20001111a",
                  },
                  {
                     name: "1926",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/1926",
                  },
                  {
                     name: "CLA-2000:350",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000350",
                  },
                  {
                     name: "oval:org.mitre.oval:def:4047",
                     refsource: "OVAL",
                     url: "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4047",
                  },
                  {
                     name: "SSRT1-41U",
                     refsource: "COMPAQ",
                     url: "http://archives.neohapsis.com/archives/tru64/2002-q1/0009.html",
                  },
                  {
                     name: "2006",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/2006",
                  },
                  {
                     name: "MDKSA-2000-069",
                     refsource: "MANDRAKE",
                     url: "http://www.linux-mandrake.com/en/security/MDKSA-2000-069.php3",
                  },
                  {
                     name: "CSSA-2000-042.0",
                     refsource: "CALDERA",
                     url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-042.0.txt",
                  },
                  {
                     name: "RHSA-2000:117",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2000-117.html",
                  },
                  {
                     name: "VU#10277",
                     refsource: "CERT-VN",
                     url: "http://www.kb.cert.org/vuls/id/10277",
                  },
                  {
                     name: "20001130 [ADV/EXP]: RH6.x root from bash /tmp vuln + MORE",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=97561816504170&w=2",
                  },
                  {
                     name: "FreeBSD-SA-00:76",
                     refsource: "FREEBSD",
                     url: "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:76.tcsh-csh.asc",
                  },
                  {
                     name: "20001028 tcsh: unsafe tempfile in << redirects",
                     refsource: "BUGTRAQ",
                     url: "http://archives.neohapsis.com/archives/bugtraq/2000-10/0418.html",
                  },
                  {
                     name: "MDKSA-2000:075",
                     refsource: "MANDRAKE",
                     url: "http://www.linux-mandrake.com/en/security/MDKSA-2000-075.php3",
                  },
                  {
                     name: "CSSA-2000-043.0",
                     refsource: "CALDERA",
                     url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-043.0.txt",
                  },
                  {
                     name: "20011103-02-P",
                     refsource: "SGI",
                     url: "ftp://patches.sgi.com/support/free/security/advisories/20011103-02-P",
                  },
                  {
                     name: "20001128  /bin/sh creates insecure tmp files",
                     refsource: "BUGTRAQ",
                     url: "http://www.securityfocus.com/archive/1/146657",
                  },
                  {
                     name: "CLSA-2000:354",
                     refsource: "CONECTIVA",
                     url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000354",
                  },
                  {
                     name: "RHSA-2000:121",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2000-121.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2000-1134",
      datePublished: "2000-12-19T05:00:00",
      dateReserved: "2000-12-14T00:00:00",
      dateUpdated: "2024-08-08T05:45:37.043Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2000-0917
Vulnerability from cvelistv5
Published
2001-01-22 05:00
Modified
2024-08-08 05:37
Severity ?
Summary
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T05:37:31.427Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "FreeBSD-SA-00:56",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FREEBSD",
                     "x_transferred",
                  ],
                  url: "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:56.lprng.asc",
               },
               {
                  name: "CSSA-2000-033.0",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CALDERA",
                     "x_transferred",
                  ],
                  url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-033.0.txt",
               },
               {
                  name: "CA-2000-22",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT",
                     "x_transferred",
                  ],
                  url: "http://www.cert.org/advisories/CA-2000-22.html",
               },
               {
                  name: "20000925 Format strings: bug #2: LPRng",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://archives.neohapsis.com/archives/bugtraq/2000-09/0293.html",
               },
               {
                  name: "RHSA-2000:065",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2000-065.html",
               },
               {
                  name: "lprng-format-string(5287)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5287",
               },
               {
                  name: "1712",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/1712",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2000-09-25T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2004-09-02T09:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "FreeBSD-SA-00:56",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FREEBSD",
               ],
               url: "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:56.lprng.asc",
            },
            {
               name: "CSSA-2000-033.0",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CALDERA",
               ],
               url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-033.0.txt",
            },
            {
               name: "CA-2000-22",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT",
               ],
               url: "http://www.cert.org/advisories/CA-2000-22.html",
            },
            {
               name: "20000925 Format strings: bug #2: LPRng",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://archives.neohapsis.com/archives/bugtraq/2000-09/0293.html",
            },
            {
               name: "RHSA-2000:065",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2000-065.html",
            },
            {
               name: "lprng-format-string(5287)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5287",
            },
            {
               name: "1712",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/1712",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2000-0917",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "FreeBSD-SA-00:56",
                     refsource: "FREEBSD",
                     url: "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:56.lprng.asc",
                  },
                  {
                     name: "CSSA-2000-033.0",
                     refsource: "CALDERA",
                     url: "http://www.calderasystems.com/support/security/advisories/CSSA-2000-033.0.txt",
                  },
                  {
                     name: "CA-2000-22",
                     refsource: "CERT",
                     url: "http://www.cert.org/advisories/CA-2000-22.html",
                  },
                  {
                     name: "20000925 Format strings: bug #2: LPRng",
                     refsource: "BUGTRAQ",
                     url: "http://archives.neohapsis.com/archives/bugtraq/2000-09/0293.html",
                  },
                  {
                     name: "RHSA-2000:065",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2000-065.html",
                  },
                  {
                     name: "lprng-format-string(5287)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5287",
                  },
                  {
                     name: "1712",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/1712",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2000-0917",
      datePublished: "2001-01-22T05:00:00",
      dateReserved: "2000-11-24T00:00:00",
      dateUpdated: "2024-08-08T05:37:31.427Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2000-1195
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 05:45
Severity ?
Summary
telnet daemon (telnetd) from the Linux netkit package before netkit-telnet-0.16 allows remote attackers to bypass authentication when telnetd is running with the -L command line option.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T05:45:37.537Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "telnetd-login-bypass(4225)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/4225",
               },
               {
                  name: "CSSA-2000-008.0",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CALDERA",
                     "x_transferred",
                  ],
                  url: "http://www.caldera.com/support/security/advisories/CSSA-2000-008.0.txt",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2000-05-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "telnet daemon (telnetd) from the Linux netkit package before netkit-telnet-0.16 allows remote attackers to bypass authentication when telnetd is running with the -L command line option.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2002-02-26T10:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "telnetd-login-bypass(4225)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/4225",
            },
            {
               name: "CSSA-2000-008.0",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CALDERA",
               ],
               url: "http://www.caldera.com/support/security/advisories/CSSA-2000-008.0.txt",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2000-1195",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "telnet daemon (telnetd) from the Linux netkit package before netkit-telnet-0.16 allows remote attackers to bypass authentication when telnetd is running with the -L command line option.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "telnetd-login-bypass(4225)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/4225",
                  },
                  {
                     name: "CSSA-2000-008.0",
                     refsource: "CALDERA",
                     url: "http://www.caldera.com/support/security/advisories/CSSA-2000-008.0.txt",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2000-1195",
      datePublished: "2002-03-09T05:00:00",
      dateReserved: "2001-08-31T00:00:00",
      dateUpdated: "2024-08-08T05:45:37.537Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2001-0181
Vulnerability from cvelistv5
Published
2001-03-09 05:00
Modified
2024-08-08 04:14
Severity ?
Summary
Format string vulnerability in the error logging code of DHCP server and client in Caldera Linux allows remote attackers to execute arbitrary commands.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T04:14:06.467Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "dhcp-format-string(5953)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5953",
               },
               {
                  name: "CSSA-2001-003.0",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CALDERA",
                     "x_transferred",
                  ],
                  url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-003.0.txt",
               },
               {
                  name: "2215",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/2215",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2001-01-15T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Format string vulnerability in the error logging code of DHCP server and client in Caldera Linux allows remote attackers to execute arbitrary commands.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-12-18T21:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "dhcp-format-string(5953)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5953",
            },
            {
               name: "CSSA-2001-003.0",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CALDERA",
               ],
               url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-003.0.txt",
            },
            {
               name: "2215",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/2215",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2001-0181",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Format string vulnerability in the error logging code of DHCP server and client in Caldera Linux allows remote attackers to execute arbitrary commands.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "dhcp-format-string(5953)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/5953",
                  },
                  {
                     name: "CSSA-2001-003.0",
                     refsource: "CALDERA",
                     url: "http://www.calderasystems.com/support/security/advisories/CSSA-2001-003.0.txt",
                  },
                  {
                     name: "2215",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/2215",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2001-0181",
      datePublished: "2001-03-09T05:00:00",
      dateReserved: "2001-03-08T00:00:00",
      dateUpdated: "2024-08-08T04:14:06.467Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}