CVE-2001-0248

Buffer overflow in FTP server in HPUX 11 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings.
References
Link Resource
http://www.cert.org/advisories/CA-2001-07.html Patch Third Party Advisory US Government Resource
http://www.nai.com/research/covert/advisories/048.asp Broken Link
http://www.securityfocus.com/bid/2552 Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 Third Party Advisory VDB Entry
http://www.cert.org/advisories/CA-2001-07.html Patch Third Party Advisory US Government Resource
http://www.nai.com/research/covert/advisories/048.asp Broken Link
http://www.securityfocus.com/bid/2552 Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:34

Type Values Removed Values Added
References () http://www.cert.org/advisories/CA-2001-07.html - Patch, Third Party Advisory, US Government Resource () http://www.cert.org/advisories/CA-2001-07.html - Patch, Third Party Advisory, US Government Resource
References () http://www.nai.com/research/covert/advisories/048.asp - Broken Link () http://www.nai.com/research/covert/advisories/048.asp - Broken Link
References () http://www.securityfocus.com/bid/2552 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory () http://www.securityfocus.com/bid/2552 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 - Third Party Advisory, VDB Entry

02 Feb 2024, 03:06

Type Values Removed Values Added
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 9.8
CPE cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
First Time Sgi
Sgi irix
References (NAI) http://www.nai.com/research/covert/advisories/048.asp - (NAI) http://www.nai.com/research/covert/advisories/048.asp - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 - Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/2552 - Exploit, Patch, Vendor Advisory (BID) http://www.securityfocus.com/bid/2552 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
CWE NVD-CWE-Other CWE-131

Information

Published : 2001-06-18 04:00

Updated : 2024-11-20 23:34


NVD link : CVE-2001-0248

Mitre link : CVE-2001-0248

CVE.ORG link : CVE-2001-0248


JSON object : View

Products Affected

sgi

  • irix

hp

  • hp-ux
CWE
CWE-131

Incorrect Calculation of Buffer Size