Vulnerability Description
Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sgi | Irix | <= 6.5.8 |
References
- ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P
- http://www.kb.cert.org/vuls/id/258632US Government Resource
- http://www.osvdb.org/1822
- http://www.securityfocus.com/bid/2714
- http://xforce.iss.net/alerts/advise76.phpVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6502
- ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P
- http://www.kb.cert.org/vuls/id/258632US Government Resource
- http://www.osvdb.org/1822
- http://www.securityfocus.com/bid/2714
- http://xforce.iss.net/alerts/advise76.phpVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6502
FAQ
What is CVE-2001-0331?
CVE-2001-0331 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands.
How severe is CVE-2001-0331?
CVE-2001-0331 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0331?
Check the references section above for vendor advisories and patch information. Affected products include: Sgi Irix.