CVE-2001-0803

Buffer overflow in the client connection routine of libDtSvc.so.1 in CDE Subprocess Control Service (dtspcd) allows remote attackers to execute arbitrary commands.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20011107-01-P
ftp://stage.caldera.com/pub/security/openunix/CSSA-2001-SCO.30/
http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/214
http://www.cert.org/advisories/CA-2001-31.html US Government Resource
http://www.cert.org/advisories/CA-2002-01.html US Government Resource
http://www.kb.cert.org/vuls/id/172583 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/advisories/3651 Patch Vendor Advisory
http://www.securityfocus.com/bid/3517 Patch Vendor Advisory
http://xforce.iss.net/alerts/advise101.php Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/7396
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A70
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A74
ftp://patches.sgi.com/support/free/security/advisories/20011107-01-P
ftp://stage.caldera.com/pub/security/openunix/CSSA-2001-SCO.30/
http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml
http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/214
http://www.cert.org/advisories/CA-2001-31.html US Government Resource
http://www.cert.org/advisories/CA-2002-01.html US Government Resource
http://www.kb.cert.org/vuls/id/172583 Patch Third Party Advisory US Government Resource
http://www.securityfocus.com/advisories/3651 Patch Vendor Advisory
http://www.securityfocus.com/bid/3517 Patch Vendor Advisory
http://xforce.iss.net/alerts/advise101.php Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/7396
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A70
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A74
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:open_group:cde_common_desktop_environment:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:open_group:cde_common_desktop_environment:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:open_group:cde_common_desktop_environment:1.1:*:*:*:*:*:*:*
cpe:2.3:a:open_group:cde_common_desktop_environment:1.2:*:*:*:*:*:*:*
cpe:2.3:a:open_group:cde_common_desktop_environment:2.0:*:*:*:*:*:*:*
cpe:2.3:a:open_group:cde_common_desktop_environment:2.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:36

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20011107-01-P - () ftp://patches.sgi.com/support/free/security/advisories/20011107-01-P -
References () ftp://stage.caldera.com/pub/security/openunix/CSSA-2001-SCO.30/ - () ftp://stage.caldera.com/pub/security/openunix/CSSA-2001-SCO.30/ -
References () http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml - () http://ftp.support.compaq.com/patches/.new/html/SSRT-541.shtml -
References () http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/214 - () http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/214 -
References () http://www.cert.org/advisories/CA-2001-31.html - US Government Resource () http://www.cert.org/advisories/CA-2001-31.html - US Government Resource
References () http://www.cert.org/advisories/CA-2002-01.html - US Government Resource () http://www.cert.org/advisories/CA-2002-01.html - US Government Resource
References () http://www.kb.cert.org/vuls/id/172583 - Patch, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/172583 - Patch, Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/advisories/3651 - Patch, Vendor Advisory () http://www.securityfocus.com/advisories/3651 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/3517 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/3517 - Patch, Vendor Advisory
References () http://xforce.iss.net/alerts/advise101.php - Vendor Advisory () http://xforce.iss.net/alerts/advise101.php - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/7396 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/7396 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A70 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A70 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A74 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A74 -

Information

Published : 2001-12-06 05:00

Updated : 2024-11-20 23:36


NVD link : CVE-2001-0803

Mitre link : CVE-2001-0803

CVE.ORG link : CVE-2001-0803


JSON object : View

Products Affected

open_group

  • cde_common_desktop_environment
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer