CVE-2001-0473
Published Jun 27, 2001
Last updated 7 years ago
Overview
- Description
- Format string vulnerability in Mutt before 1.2.5 allows a remote malicious IMAP server to execute arbitrary commands.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:immunix:immunix:6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB0F79BE-8EBF-44D8-83A1-9331669BED54" }, { "criteria": "cpe:2.3:a:immunix:immunix:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "660CA978-FDA1-4D48-8162-9CB9243A1B7E" }, { "criteria": "cpe:2.3:a:immunix:immunix:7.0_beta:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A2889C6-8DE0-4432-812A-F2A5C4A08897" }, { "criteria": "cpe:2.3:a:mutt:mutt:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "922D20A2-43EB-45FE-B01C-CBFBE66FA435", "versionEndIncluding": "1.2.5" }, { "criteria": "cpe:2.3:o:conectiva:linux:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C74C8F2C-92F4-4A9F-BF5A-8B5DF1A50DC7" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D323A6B7-2741-4F31-B0D6-5D6FB738A2A1" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACAAD334-2CA7-4B3B-BA25-302E7610BC2A" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4853E92-5E0A-47B9-A343-D5BEE87D2C27" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EC1FF5D-5EAB-44D5-B281-770547C70D68" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A8FBD5A-2FD0-43CD-AC4B-1D6984D336FE" }, { "criteria": "cpe:2.3:o:redhat:linux:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8EED385-8C39-4A40-A507-2EFE7652FB35" }, { "criteria": "cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DFA94D5-0139-490C-8257-0751FE9FBAE4" }, { "criteria": "cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EC4D3AB-38FA-4D44-AF5C-2DCD15994E76" }, { "criteria": "cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0633B5A6-7A88-4A96-9462-4C09D124ED36" }, { "criteria": "cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29B186E5-7C2F-466E-AA4A-8F2B618F8A14" } ], "operator": "OR" } ] } ]