CVE-1999-0097
Published Oct 29, 1997
Last updated 2 years ago
Overview
- Description
- The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E436D06-FA3A-43F6-AF84-2E9C2F42E3FF" }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCB1B6DC-4FF9-40DC-BAD5-91A04E79981E" }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7FA635E-C0FE-495C-A2BB-D9C30A95FD00" }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E178238D-E17A-48C9-8922-AC92474BDF55" }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "560C17E1-6154-4291-A838-5E76139B9FB5" }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.06:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3194CFA3-F0B3-487A-99C6-1A7DF1EF0586" }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "035890F7-BF48-4669-812A-1DCBD91A8F34" }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.08:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9AED8F3-2501-444D-8141-37FEE2246747" }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.09:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10974B0F-DA3A-4E3E-8914-8CEB366E9CC4" }, { "criteria": "cpe:2.3:o:hp:hp-ux:9.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C54F7F74-7DD7-431E-AE75-1D1199D63032" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3187435B-C052-4DBA-AA79-F8AC0287EE14" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38E41C26-A086-4C9C-83D8-CB910F4B67F1" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4259A901-A1CF-44EE-80C4-2031D3FCADC3" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647" }, { "criteria": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD5E0678-45C7-492A-963C-897494D6878F" }, { "criteria": "cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E55C28A7-CD21-47CD-AA50-E8B2D89A18E8" }, { "criteria": "cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3C00FC9-AD97-4226-A0EA-7DB14AA592DE" }, { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079" }, { "criteria": "cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3BA7775-30F2-4CA0-BA6E-70ED12A48D90" }, { "criteria": "cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB038A89-1CA6-4313-B7CE-56C894945FFD" }, { "criteria": "cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B3BC86F-5718-4232-BFFF-6244A7C09B8F" }, { "criteria": "cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6118CC1-6E51-4E1B-8F58-43B337515222" }, { "criteria": "cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3D3B348-270F-4209-B31A-2B40F5E4A601" }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657" }, { "criteria": "cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91D7C561-4D23-430B-A7D8-137E52B08FF5" }, { "criteria": "cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F881110-7B54-49DA-B23A-710273430C44" }, { "criteria": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "200D8CB2-0D52-40A8-9CD9-6E4513605201" }, { "criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54AF87E4-52A4-44CA-B48E-A5BB139E6410" }, { "criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F66BAF35-A8B9-4E95-B270-444206FDD35B" }, { "criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B" }, { "criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB" }, { "criteria": "cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "915D5897-B5FF-4F26-936E-9BAEF2604A86" }, { "criteria": "cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD1BA107-F2D3-4F13-82EC-4576C429E3C1" }, { "criteria": "cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1070749A-65E9-439A-A7CC-3CE529A5D5E7" }, { "criteria": "cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C7A22D21-E0A9-4B56-86C7-805AD1A610D6" }, { "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F" }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416" }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A" } ], "operator": "OR" } ] } ]