CVE-2001-0138
Published Mar 12, 2001
Last updated 7 years ago
Overview
- Description
- privatepw program in wu-ftpd before 2.6.1-6 allows local users to overwrite arbitrary files via a symlink attack.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 1.2
- Impact score
- 2.9
- Exploitability score
- 1.9
- Vector string
- AV:L/AC:H/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:immunix:immunix:7.0_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A2889C6-8DE0-4432-812A-F2A5C4A08897" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58B90124-0543-4226-BFF4-13CCCBCCB243" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:68k:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E040A866-0D2C-40E1-B1FB-DB600B389E27" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE1C944A-E5F1-49DE-B069-2A358123B535" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:arm:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D71083B4-1736-4501-8DE8-BC24AC1447AA" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:powerpc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A32E486-2598-41B3-B6DB-3CC46D239AFC" }, { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAEE18D8-AA3B-47A3-AA7C-AAFF7591F391" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D323A6B7-2741-4F31-B0D6-5D6FB738A2A1" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACAAD334-2CA7-4B3B-BA25-302E7610BC2A" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4853E92-5E0A-47B9-A343-D5BEE87D2C27" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EC1FF5D-5EAB-44D5-B281-770547C70D68" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A8FBD5A-2FD0-43CD-AC4B-1D6984D336FE" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97E09AD9-F057-4264-88BB-A8A18C1B1246" }, { "criteria": "cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29B186E5-7C2F-466E-AA4A-8F2B618F8A14" } ], "operator": "OR" } ] } ]