Vulnerability Description
Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Immunix | Immunix | 6.2 |
| Redhat | Linux | 5.2 |
| Suse | Suse Linux | 6.0 |
References
- http://archives.neohapsis.com/archives/bugtraq/2001-05/0087.htmlVendor Advisory
- http://www.novell.com/linux/security/advisories/2001_019_man_txt.html
- http://www.redhat.com/support/errata/RHSA-2001-069.htmlPatchVendor Advisory
- http://www.securityfocus.com/archive/1/190136
- http://www.securityfocus.com/bid/2711ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6530
- http://archives.neohapsis.com/archives/bugtraq/2001-05/0087.htmlVendor Advisory
- http://www.novell.com/linux/security/advisories/2001_019_man_txt.html
- http://www.redhat.com/support/errata/RHSA-2001-069.htmlPatchVendor Advisory
- http://www.securityfocus.com/archive/1/190136
- http://www.securityfocus.com/bid/2711ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6530
FAQ
What is CVE-2001-0641?
CVE-2001-0641 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.
How severe is CVE-2001-0641?
CVE-2001-0641 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0641?
Check the references section above for vendor advisories and patch information. Affected products include: Immunix Immunix, Redhat Linux, Suse Suse Linux.