7.5
CVSSv2

CVE-2001-0763

Published: 18/10/2001 Updated: 03/05/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and previous versions may allow remote malicious users to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.

Vulnerable Product Search on Vulmon Subscribe to Product

suse suse linux 6.0

suse suse linux 6.1

debian debian linux

suse suse linux 6.4

suse suse linux 7.0

suse suse linux 6.2

suse suse linux 6.3

suse suse linux 7.1

suse suse linux 7.2

Exploits

source: wwwsecurityfocuscom/bid/2840/info The possibility for a buffer overflow condition exists in the xinetd daemon Xinetd provides the ability to log via identd the user-identities of clients connecting to specific services if the clients host supports it It may be possible for attackers to construct identd responses which exploit ...