Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2001-0247

Buffer overflows in BSD-based FTP servers allows remote attackers to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.352
EPSS Ranking 96.8%
CVSS Severity
CVSS v2 Score 10.0
References
Products affected by CVE-2001-0247
  • Mit » Kerberos 5 » Version: 1.1.1
    cpe:2.3:a:mit:kerberos_5:1.1.1
  • Mit » Kerberos 5 » Version: 1.2
    cpe:2.3:a:mit:kerberos_5:1.2
  • Mit » Kerberos 5 » Version: 1.2.1
    cpe:2.3:a:mit:kerberos_5:1.2.1
  • Mit » Kerberos 5 » Version: 1.2.2
    cpe:2.3:a:mit:kerberos_5:1.2.2
  • Freebsd » Freebsd » Version: 2.2
    cpe:2.3:o:freebsd:freebsd:2.2
  • Freebsd » Freebsd » Version: 2.2.2
    cpe:2.3:o:freebsd:freebsd:2.2.2
  • Freebsd » Freebsd » Version: 2.2.3
    cpe:2.3:o:freebsd:freebsd:2.2.3
  • Freebsd » Freebsd » Version: 2.2.4
    cpe:2.3:o:freebsd:freebsd:2.2.4
  • Freebsd » Freebsd » Version: 2.2.5
    cpe:2.3:o:freebsd:freebsd:2.2.5
  • Freebsd » Freebsd » Version: 2.2.6
    cpe:2.3:o:freebsd:freebsd:2.2.6
  • Freebsd » Freebsd » Version: 2.2.8
    cpe:2.3:o:freebsd:freebsd:2.2.8
  • Freebsd » Freebsd » Version: 3.0
    cpe:2.3:o:freebsd:freebsd:3.0
  • Freebsd » Freebsd » Version: 3.1
    cpe:2.3:o:freebsd:freebsd:3.1
  • Freebsd » Freebsd » Version: 3.2
    cpe:2.3:o:freebsd:freebsd:3.2
  • Freebsd » Freebsd » Version: 3.3
    cpe:2.3:o:freebsd:freebsd:3.3
  • Freebsd » Freebsd » Version: 3.4
    cpe:2.3:o:freebsd:freebsd:3.4
  • Freebsd » Freebsd » Version: 3.5
    cpe:2.3:o:freebsd:freebsd:3.5
  • Freebsd » Freebsd » Version: 3.5.1
    cpe:2.3:o:freebsd:freebsd:3.5.1
  • Freebsd » Freebsd » Version: 4.0
    cpe:2.3:o:freebsd:freebsd:4.0
  • Freebsd » Freebsd » Version: 4.1
    cpe:2.3:o:freebsd:freebsd:4.1
  • Freebsd » Freebsd » Version: 4.1.1
    cpe:2.3:o:freebsd:freebsd:4.1.1
  • Freebsd » Freebsd » Version: 4.2
    cpe:2.3:o:freebsd:freebsd:4.2
  • Netbsd » Netbsd » Version: 1.2.1
    cpe:2.3:o:netbsd:netbsd:1.2.1
  • Netbsd » Netbsd » Version: 1.3
    cpe:2.3:o:netbsd:netbsd:1.3
  • Netbsd » Netbsd » Version: 1.3.1
    cpe:2.3:o:netbsd:netbsd:1.3.1
  • Netbsd » Netbsd » Version: 1.3.2
    cpe:2.3:o:netbsd:netbsd:1.3.2
  • Netbsd » Netbsd » Version: 1.3.3
    cpe:2.3:o:netbsd:netbsd:1.3.3
  • Netbsd » Netbsd » Version: 1.4
    cpe:2.3:o:netbsd:netbsd:1.4
  • Netbsd » Netbsd » Version: 1.4.1
    cpe:2.3:o:netbsd:netbsd:1.4.1
  • Netbsd » Netbsd » Version: 1.4.2
    cpe:2.3:o:netbsd:netbsd:1.4.2
  • Netbsd » Netbsd » Version: 1.4.3
    cpe:2.3:o:netbsd:netbsd:1.4.3
  • Netbsd » Netbsd » Version: 1.5
    cpe:2.3:o:netbsd:netbsd:1.5
  • Openbsd » Openbsd » Version: 2.3
    cpe:2.3:o:openbsd:openbsd:2.3
  • Openbsd » Openbsd » Version: 2.4
    cpe:2.3:o:openbsd:openbsd:2.4
  • Openbsd » Openbsd » Version: 2.5
    cpe:2.3:o:openbsd:openbsd:2.5
  • Openbsd » Openbsd » Version: 2.6
    cpe:2.3:o:openbsd:openbsd:2.6
  • Openbsd » Openbsd » Version: 2.7
    cpe:2.3:o:openbsd:openbsd:2.7
  • Openbsd » Openbsd » Version: 2.8
    cpe:2.3:o:openbsd:openbsd:2.8
  • Sgi » Irix » Version: 6.1
    cpe:2.3:o:sgi:irix:6.1
  • Sgi » Irix » Version: 6.5.1
    cpe:2.3:o:sgi:irix:6.5.1
  • Sgi » Irix » Version: 6.5.10
    cpe:2.3:o:sgi:irix:6.5.10
  • Sgi » Irix » Version: 6.5.11
    cpe:2.3:o:sgi:irix:6.5.11
  • Sgi » Irix » Version: 6.5.2m
    cpe:2.3:o:sgi:irix:6.5.2m
  • Sgi » Irix » Version: 6.5.3
    cpe:2.3:o:sgi:irix:6.5.3
  • Sgi » Irix » Version: 6.5.3f
    cpe:2.3:o:sgi:irix:6.5.3f
  • Sgi » Irix » Version: 6.5.3m
    cpe:2.3:o:sgi:irix:6.5.3m
  • Sgi » Irix » Version: 6.5.4
    cpe:2.3:o:sgi:irix:6.5.4
  • Sgi » Irix » Version: 6.5.5
    cpe:2.3:o:sgi:irix:6.5.5
  • Sgi » Irix » Version: 6.5.6
    cpe:2.3:o:sgi:irix:6.5.6
  • Sgi » Irix » Version: 6.5.7
    cpe:2.3:o:sgi:irix:6.5.7
  • Sgi » Irix » Version: 6.5.8
    cpe:2.3:o:sgi:irix:6.5.8


Contact Us

Shodan ® - All rights reserved