Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2001-0441
Buffer overflow in (1) wrapping and (2) unwrapping functions of slrn news reader before 0.9.7.0 allows remote attackers to execute arbitrary commands via a long message header.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.014
EPSS Ranking
79.6%
CVSS Severity
CVSS v2 Score
7.5
References
http://archives.neohapsis.com/archives/freebsd/2001-04/0610.html
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000383
http://marc.info/?l=bugtraq&m=98471253131191&w=2
http://www.debian.org/security/2001/dsa-040
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-028.php3
http://www.redhat.com/support/errata/RHSA-2001-028.html
http://www.securityfocus.com/bid/2493
https://exchange.xforce.ibmcloud.com/vulnerabilities/6213
http://archives.neohapsis.com/archives/freebsd/2001-04/0610.html
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000383
http://marc.info/?l=bugtraq&m=98471253131191&w=2
http://www.debian.org/security/2001/dsa-040
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-028.php3
http://www.redhat.com/support/errata/RHSA-2001-028.html
http://www.securityfocus.com/bid/2493
https://exchange.xforce.ibmcloud.com/vulnerabilities/6213
Products affected by CVE-2001-0441
Debian
»
Debian Linux
»
Version:
N/A
cpe:2.3:o:debian:debian_linux:-
Debian
»
Debian Linux
»
Version:
0.9.1
cpe:2.3:o:debian:debian_linux:0.9.1
Debian
»
Debian Linux
»
Version:
0.9.2
cpe:2.3:o:debian:debian_linux:0.9.2
Debian
»
Debian Linux
»
Version:
0.9.3
cpe:2.3:o:debian:debian_linux:0.9.3
Debian
»
Debian Linux
»
Version:
0.9.4
cpe:2.3:o:debian:debian_linux:0.9.4
Debian
»
Debian Linux
»
Version:
0.93
cpe:2.3:o:debian:debian_linux:0.93
Debian
»
Debian Linux
»
Version:
1.1
cpe:2.3:o:debian:debian_linux:1.1
Debian
»
Debian Linux
»
Version:
1.2
cpe:2.3:o:debian:debian_linux:1.2
Debian
»
Debian Linux
»
Version:
1.3
cpe:2.3:o:debian:debian_linux:1.3
Debian
»
Debian Linux
»
Version:
1.3.1
cpe:2.3:o:debian:debian_linux:1.3.1
Debian
»
Debian Linux
»
Version:
2.0
cpe:2.3:o:debian:debian_linux:2.0
Debian
»
Debian Linux
»
Version:
2.0.34
cpe:2.3:o:debian:debian_linux:2.0.34
Debian
»
Debian Linux
»
Version:
2.0.5
cpe:2.3:o:debian:debian_linux:2.0.5
Debian
»
Debian Linux
»
Version:
2.1
cpe:2.3:o:debian:debian_linux:2.1
Debian
»
Debian Linux
»
Version:
2.1.8.8.p3-1.1
cpe:2.3:o:debian:debian_linux:2.1.8.8.p3-1.1
Debian
»
Debian Linux
»
Version:
2.2
cpe:2.3:o:debian:debian_linux:2.2
Mandrakesoft
»
Mandrake Linux
»
Version:
6.0
cpe:2.3:o:mandrakesoft:mandrake_linux:6.0
Mandrakesoft
»
Mandrake Linux
»
Version:
6.1
cpe:2.3:o:mandrakesoft:mandrake_linux:6.1
Mandrakesoft
»
Mandrake Linux
»
Version:
7.0
cpe:2.3:o:mandrakesoft:mandrake_linux:7.0
Mandrakesoft
»
Mandrake Linux
»
Version:
7.1
cpe:2.3:o:mandrakesoft:mandrake_linux:7.1
Mandrakesoft
»
Mandrake Linux
»
Version:
7.2
cpe:2.3:o:mandrakesoft:mandrake_linux:7.2
Mandrakesoft
»
Mandrake Linux Corporate Server
»
Version:
1.0.1
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:1.0.1
Redhat
»
Linux
»
Version:
6.2
cpe:2.3:o:redhat:linux:6.2
Redhat
»
Linux
»
Version:
7.0
cpe:2.3:o:redhat:linux:7.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved