CVE-2001-0834
Published Dec 6, 2001
Last updated 7 years ago
Overview
- Description
- htsearch CGI program in htdig (ht://Dig) 3.1.5 and earlier allows remote attackers to use the -c option to specify an alternate configuration file, which could be used to (1) cause a denial of service (CPU consumption) by specifying a large file such as /dev/zero, or (2) read arbitrary files by uploading an alternate configuration file that specifies the target file.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:htdig:htdig:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43CC50AC-510B-4340-AF87-872992FC38DB", "versionEndIncluding": "3.1.5" }, { "criteria": "cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "537A5C29-D770-4755-A6AB-8916754E14DB" }, { "criteria": "cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3AC05A9-04DA-4ED3-94D8-3254384CB724" }, { "criteria": "cpe:2.3:o:conectiva:linux:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCE4BBA3-7332-45EE-8C29-BE5A473B559D" }, { "criteria": "cpe:2.3:o:conectiva:linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97177EF7-8FC4-4D4D-A8D9-3628AA0035FB" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58B90124-0543-4226-BFF4-13CCCBCCB243" }, { "criteria": "cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AD0FF64-05DF-48C2-9BB5-FD993121FB2E" }, { "criteria": "cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7786607A-362E-4817-A17E-C76D6A1F737D" }, { "criteria": "cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9E7D75A-333E-4C63-9593-F64ABA5D1CE3" }, { "criteria": "cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "819868A7-EB1E-4CA9-8D71-72F194E5EFEB" }, { "criteria": "cpe:2.3:o:suse:suse_linux:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0519FF7D-363E-4530-9E63-6EA3E88432DC" }, { "criteria": "cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FAE3FF4F-646F-4E05-A08A-C9399DEF60F1" } ], "operator": "OR" } ] } ]