CVE-2001-0247
Published Jun 18, 2001
Last updated 5 years ago
Overview
- Description
- Buffer overflows in BSD-based FTP servers allows remote attackers to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E47F0770-67D7-42EE-A1AD-9D5B5E83BF2B" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE8C0C82-749E-4837-88F8-FB56A753B094" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AD672FA-918D-48CB-BC03-4E412AF0DCCC" }, { "criteria": "cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0B363A4-BB7A-48A2-AE6B-BD2DDD46E7CB" }, { "criteria": "cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "966C1A13-8007-408D-96BE-0DA3BB6CA401" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36B60E50-4F5A-4404-BEA3-C94F7D27B156" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "772E3C7E-9947-414F-8642-18653BB048E0" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6B2E6D1-8C2D-4E15-A6BB-E4FE878ED1E7" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D51EC29-8836-4F87-ABF8-FF7530DECBB1" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "518B7253-7B0F-4A0A-ADA7-F3E3B5AAF877" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "440B7208-34DB-4898-8461-4E703F7EDFB7" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5663579C-3AD2-4E5B-A595-C8DB984F9C26" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D07AA144-6FD7-4C80-B4F2-D21C1AFC864A" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29113D8E-9618-4A0E-9157-678332082858" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "313613E9-4837-433C-90EE-84A92E8D24E5" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60CC9410-F6B8-4748-B76F-30626279028E" }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCC67401-C85A-4E4E-AE61-85FEBBF4346B" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "183667CA-6DF1-4BFB-AE32-9ABF55B7283A" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBDDEC3F-52EB-4E1E-84C4-B472600059EC" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B58E02AE-38B4-466E-BF73-2F0B80AF7BA5" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3928D5CF-6FC0-434C-8A80-ABDBF346C2C9" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "314BA420-4C74-4060-8ACE-D7A7C041CF2B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EAD7613-A5B3-4621-B981-290C7C6B8BA0" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1CA3337-9BEE-49C5-9EDE-8CDBE5580537" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE38C50A-81FE-412E-9717-3672FAE6A6F4" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "263F3734-7076-4EA8-B4C0-F37CFC4E979E" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0419DD66-FF66-48BC-AD3B-F6AFD0551E36" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B982342C-1981-4C55-8044-AFE4D87623DF" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47E02BE6-4800-4940-B269-385B66AC5077" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C283AD7-1C58-4CE8-A6CD-502FFE0B18BB" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0A585A1-FF82-418F-90F8-072458DB7816" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE31DFF8-06AB-489D-A0C5-509C090283B5" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF49BF03-C25E-4737-84D5-892895C86C58" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC7A39CD-C4B2-4FD9-A450-E5C7A5480174" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CBA1B13-B378-4F13-BD13-EC58F15F5C81" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8C8CAB1-2D8C-4875-A795-41178D48410F" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D3C937A-E9D8-474A-ABEB-A927EF7CC5B0" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C422E343-ADF2-427D-865D-B5C35431EFD1" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C288A88-11C6-429E-A109-0395D0989264" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "516C6D9A-7483-4E36-A2E0-42698161AD31" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1F89124-E194-4C7A-B06D-8535B4066AA3" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D2DA7F0-E3C0-447A-A2B0-ECC928389D84" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEBE290B-5EC6-4BBA-B645-294C150E417A" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACE7FDFB-C6A6-4B58-B0B4-236E4EA76EF6" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DF053A1-C252-427E-9EEF-27240F422976" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48A9C344-45AA-47B9-B35A-1A62E220D9C6" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80EB24F0-46A7-481B-83ED-8BB012AE0C8E" } ], "operator": "OR" } ] } ]