CVE-2001-1173
Published Jul 26, 2001
Last updated 16 years ago
Overview
- Description
- Vulnerability in MasqMail before 0.1.15 allows local users to gain privileges via piped aliases.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27A68123-4DD9-4830-AB08-22158B165D43" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3185B6E3-8461-433F-B99D-6317760BA39A" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE5BC49C-C86C-4DBB-8853-8838AF64C5FF" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A365F9D-D1F5-4809-94F5-CCE99ACBBC18" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28DF3F37-A462-4765-AC57-86A012FB2BAD" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17931E87-2BCB-4CF2-A018-3915538EFDF3" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FA5F557-B379-4817-8641-52166BF377BB" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C22543A3-50D9-40EE-8E38-DEB689979C74" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57643AB3-E146-406B-9181-A1884154215B" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC2E7934-3F5C-47F4-BBD9-8F28D15F77DA" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45284864-C048-47CB-8605-D65F53573112" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4215BBC-2BF0-442E-BDCB-470A3BE41897" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81BCBE50-F36D-4630-A232-C98E99A6149B" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93C4DAE9-CF55-459A-8832-C83488617A2B" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "624F1C66-698D-4DCD-82CC-737C41C8675D" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA15EFE5-4CE4-4013-BB28-2D30A51170A3" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96E25178-EA89-451C-84A2-0328190481F0" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F09AEBFD-021A-48E7-BC2F-4E2195D94BE2" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "459FEC27-B87B-470A-944C-8B4DA453E8FE" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB11DE09-1622-4566-A1F8-0634F3D4CA4A" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30ED9745-5B8D-4F2E-8904-00B8118CFEE3" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0623ADEA-8131-4BFD-9442-5837EE3C0C9A" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FFECA71-AC24-48DA-9449-F1490AFC05A5" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A2FD795-09DB-46A1-87DD-6CA4D0865950" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81B01E23-DD31-4786-9A03-67FD786681E1" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "894C3774-9ABD-4D66-840C-8599EB3B8889" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E90C5624-FF26-4AA9-B4B1-A4C397FDA67A" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "781B2305-B369-497F-B364-897CE7C805EA" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FE76015-7949-4ADF-B453-120311635F10" }, { "criteria": "cpe:2.3:a:masqmail:masqmail:0.1.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47C51DE5-5050-4D85-89A0-1C7B8AC57135" } ], "operator": "OR" } ] } ]