CVE-2001-0554 – Solaris 2.x/7.0/8 / IRIX 6.5.x / OpenBSD 2.x / NetBSD 1.x / Debian 3 / HP-UX 10 - 'TelnetD' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function. • https://www.exploit-db.com/exploits/21018 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:49.telnetd.asc ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-012.txt.asc ftp://patches.sgi.com/support/free/security/advisories/20010801-01-P ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.10/CSSA-2001-SCO.10.txt http://archives.neohapsis.com/archives/hp/2001-q4/0014.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000413 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2001-0565 – Solaris 2.5/2.6/7.0/8 - 'mailx -F' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0565
Buffer overflow in mailx in Solaris 8 and earlier allows a local attacker to gain additional privileges via a long '-F' command line option. • https://www.exploit-db.com/exploits/20772 https://www.exploit-db.com/exploits/20773 http://archives.neohapsis.com/archives/bugtraq/2001-05/0016.html http://online.securityfocus.com/archive/1/184210 http://www.kb.cert.org/vuls/id/446864 http://www.securityfocus.com/bid/2610 https://exchange.xforce.ibmcloud.com/vulnerabilities/8246 •
CVE-2001-1244 – HP-UX 11 / Linux Kernel 2.4 / Windows 2000/NT 4.0 / IRIX 6.5 - Small TCP MSS Denial of Service
https://notcve.org/view.php?id=CVE-2001-1244
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process. • https://www.exploit-db.com/exploits/20997 http://www.securityfocus.com/archive/1/195457 http://www.securityfocus.com/bid/2997 https://exchange.xforce.ibmcloud.com/vulnerabilities/6824 •
CVE-2001-0401 – Solaris 2.5/2.6/7.0/8 tip - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0401
Buffer overflow in tip in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. • https://www.exploit-db.com/exploits/20684 http://archives.neohapsis.com/archives/bugtraq/2001-03/0394.html http://www.securityfocus.com/bid/2475 https://exchange.xforce.ibmcloud.com/vulnerabilities/6284 •
CVE-2001-0421 – Solaris 2.6 - FTP Core Dump Shadow Password Recovery
https://notcve.org/view.php?id=CVE-2001-0421
FTP server in Solaris 8 and earlier allows local and remote attackers to cause a core dump in the root directory, possibly with world-readable permissions, by providing a valid username with an invalid password followed by a CWD ~ command, which could release sensitive information such as shadowed passwords, or fill the disk partition. • https://www.exploit-db.com/exploits/20764 http://www.securityfocus.com/archive/1/177200 http://www.securityfocus.com/bid/2601 •