CVE-2001-0191
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
03/05/2001
Last modified:
03/04/2025
Description
gnuserv before 3.12, as shipped with XEmacs, does not properly check the specified length of an X Windows MIT-MAGIC-COOKIE cookie, which allows remote attackers to execute arbitrary commands via a buffer overflow, or brute force authentication by using a short cookie length.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:andynorman:gnuserv:*:*:*:*:*:*:*:* | 3.12 (excluding) | |
cpe:2.3:a:gnu:xemacs:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2001-02/0030.html
- http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-019.php3
- http://www.redhat.com/support/errata/RHSA-2001-010.html
- http://www.redhat.com/support/errata/RHSA-2001-011.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6056
- http://archives.neohapsis.com/archives/bugtraq/2001-02/0030.html
- http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-019.php3
- http://www.redhat.com/support/errata/RHSA-2001-010.html
- http://www.redhat.com/support/errata/RHSA-2001-011.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6056