HIGH · 7.5

CVE-2001-0763

Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.

Vulnerability Description

Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
DebianDebian Linux<= 2.1.8.8.p3-1.1
SuseSuse Linux6.0

References

FAQ

What is CVE-2001-0763?

CVE-2001-0763 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.

How severe is CVE-2001-0763?

CVE-2001-0763 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2001-0763?

Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Suse Suse Linux.