Vulnerability Description
login.gas.bat and other CGI scripts in Entrust getAccess allow remote attackers to execute Java programs, and possibly arbitrary commands, by specifying an alternate -classpath argument.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Entrust | Getaccess | All versions |
References
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0662.htmlExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6915
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0662.htmlExploitVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6915
FAQ
What is CVE-2001-1024?
CVE-2001-1024 is a vulnerability with a CVSS score of 7.5 (HIGH). login.gas.bat and other CGI scripts in Entrust getAccess allow remote attackers to execute Java programs, and possibly arbitrary commands, by specifying an alternate -classpath argument.
How severe is CVE-2001-1024?
CVE-2001-1024 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-1024?
Check the references section above for vendor advisories and patch information. Affected products include: Entrust Getaccess.