Vulnerability Description
Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xinetd | Xinetd | <= 2.3.1 |
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000406PatchVendor Advisory
- http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-029-01
- http://www.redhat.com/support/errata/RHSA-2001-092.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/2971PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6804
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000406PatchVendor Advisory
- http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-029-01
- http://www.redhat.com/support/errata/RHSA-2001-092.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/2971PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6804
FAQ
What is CVE-2001-0825?
CVE-2001-0825 is a vulnerability with a CVSS score of 10.0 (HIGH). Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length che...
How severe is CVE-2001-0825?
CVE-2001-0825 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0825?
Check the references section above for vendor advisories and patch information. Affected products include: Xinetd Xinetd.