CVE-2001-0949
Gravedad CVSS v2.0:
ALTA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
04/12/2001
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Buffer overflows in forms.exe CGI program in ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3 through 4.2.1 allows remote attackers to execute arbitrary code via long arguments to the parameters (1) Mode, (2) Certificate_File, (3) useExpiredCRLs, (4) listenLength, (5) maxThread, (6) maxConnPerSite, (7) maxMsgLen, (8) exitTime, (9) blockTime, (10) nextUpdatePeriod, (11) buildLocal, (12) maxOCSPValidityPeriod, (13) extension, and (14) a particular combination of parameters associated with private key generation that form a string of a certain length.
Impacto
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:valicert:enterprise_validation_authority:3.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:valicert:enterprise_validation_authority:3.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:valicert:enterprise_validation_authority:3.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:valicert:enterprise_validation_authority:3.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:valicert:enterprise_validation_authority:3.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:valicert:enterprise_validation_authority:3.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:valicert:enterprise_validation_authority:3.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:valicert:enterprise_validation_authority:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:valicert:enterprise_validation_authority:4.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:valicert:enterprise_validation_authority:4.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:valicert:enterprise_validation_authority:4.2.1:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://marc.info/?l=bugtraq&m=100749428517090&w=2
- http://www.securityfocus.com/bid/3621
- http://www.securityfocus.com/bid/3622
- http://www.securityfocus.com/bid/3624
- http://www.securityfocus.com/bid/3625
- http://www.securityfocus.com/bid/3627
- http://www.securityfocus.com/bid/3628
- http://www.securityfocus.com/bid/3629
- http://www.securityfocus.com/bid/3630
- http://www.securityfocus.com/bid/3631
- http://www.securityfocus.com/bid/3632
- http://www.securityfocus.com/bid/3633
- http://www.securityfocus.com/bid/3634
- http://www.securityfocus.com/bid/3635
- http://www.securityfocus.com/bid/3636
- http://www.valicert.com/support/security_advisory_eva.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7652
- http://marc.info/?l=bugtraq&m=100749428517090&w=2
- http://www.securityfocus.com/bid/3621
- http://www.securityfocus.com/bid/3622
- http://www.securityfocus.com/bid/3624
- http://www.securityfocus.com/bid/3625
- http://www.securityfocus.com/bid/3627
- http://www.securityfocus.com/bid/3628
- http://www.securityfocus.com/bid/3629
- http://www.securityfocus.com/bid/3630
- http://www.securityfocus.com/bid/3631
- http://www.securityfocus.com/bid/3632
- http://www.securityfocus.com/bid/3633
- http://www.securityfocus.com/bid/3634
- http://www.securityfocus.com/bid/3635
- http://www.securityfocus.com/bid/3636
- http://www.valicert.com/support/security_advisory_eva.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7652