CVE-2001-0248

Buffer overflow in FTP server in HPUX 11 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings.
References
Link Resource
http://www.cert.org/advisories/CA-2001-07.html Patch Third Party Advisory US Government Resource
http://www.nai.com/research/covert/advisories/048.asp Broken Link
http://www.securityfocus.com/bid/2552 Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*

History

02 Feb 2024, 03:06

Type Values Removed Values Added
References () http://www.nai.com/research/covert/advisories/048.asp - () http://www.nai.com/research/covert/advisories/048.asp - Broken Link
References () http://www.securityfocus.com/bid/2552 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/2552 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6332 - Third Party Advisory, VDB Entry
CPE cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*
cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*
cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*
First Time Sgi irix
Sgi
CWE NVD-CWE-Other CWE-131
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 9.8

Information

Published : 2001-06-18 04:00

Updated : 2024-02-02 03:06


NVD link : CVE-2001-0248

Mitre link : CVE-2001-0248

CVE.ORG link : CVE-2001-0248


JSON object : View

Products Affected

hp

  • hp-ux

sgi

  • irix
CWE
CWE-131

Incorrect Calculation of Buffer Size