
CVE-2001-1555
https://notcve.org/view.php?id=CVE-2001-1555
31 Dec 2001 — pt_chmod in Solaris 8 does not call fdetach to reset terminal privileges when users log out of terminals, which allows local users to write to other users' terminals by modifying the ACL of a TTY. • http://securitytracker.com/id?1002732 •

CVE-2001-1503
https://notcve.org/view.php?id=CVE-2001-1503
31 Dec 2001 — The finger daemon (in.fingerd) in Sun Solaris 2.5 through 8 and SunOS 5.5 through 5.8 allows remote attackers to list all accounts on a host by typing finger 'a b c d e f g h'@host. • http://archives.neohapsis.com/archives/vulnwatch/2001-q4/0016.html •

CVE-2001-1582 – Solaris 8 libsldap - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-1582
31 Dec 2001 — Buffer overflow in the LDAP naming services library (libsldap) in Sun Solaris 8 allows local users to execute arbitrary code via a long LDAP_OPTIONS environment variable to a privileged program that uses libsldap. • https://www.exploit-db.com/exploits/20970 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2001-0797 – System V Derived /bin/login - Extraneous Arguments Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0797
12 Dec 2001 — Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin. Desbordamiento de búfer en la entrada a varios sistemas operativos basados en System V, permite a atacantes remotos la ejecución de comandos arbitrarios mediante un gran número de argumentos a través de servicios como telnet y rlogin. • https://www.exploit-db.com/exploits/16928 •

CVE-2001-0779 – OpenServer 5.0.5/5.0.6 / HP-UX 10/11 / Solaris 2.6/7.0/8 - rpc.yppasswdd Buffer Overrun
https://notcve.org/view.php?id=CVE-2001-0779
18 Oct 2001 — Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username. Desbordamiento de buffer en rpc.yppasswdd (servidor de yppasswd) en Solaris 2.6, 7 y 8 permite a atacantes remotos obtener acceso de root mediante un nombre de usuario largo. • https://www.exploit-db.com/exploits/20879 •

CVE-2001-1414
https://notcve.org/view.php?id=CVE-2001-1414
09 Oct 2001 — The Basic Security Module (BSM) for Solaris 2.5.1, 2.6, 7, and 8 does not log anonymous FTP access, which allows remote attackers to hide their activities, possibly when certain BSM audit files are not present under the FTP root. • http://sunsolve.sun.com/search/document.do?assetkey=1-26-40521-1 •

CVE-2001-0686
https://notcve.org/view.php?id=CVE-2001-0686
20 Sep 2001 — Buffer overflow in mail included with SunOS 5.8 for x86 allows a local user to gain privileges via a long HOME environment variable. • http://archives.neohapsis.com/archives/bugtraq/2001-06/0000.html •

CVE-2001-0526 – Solaris 8 mailtool - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0526
14 Aug 2001 — Buffer overflow in the Xview library as used by mailtool in Solaris 8 and earlier allows a local attacker to gain privileges via the OPENWINHOME environment variable. • https://www.exploit-db.com/exploits/20885 •

CVE-2001-0565 – Solaris 2.5/2.6/7.0/8 - 'mailx -F' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0565
14 Aug 2001 — Buffer overflow in mailx in Solaris 8 and earlier allows a local attacker to gain additional privileges via a long '-F' command line option. • https://www.exploit-db.com/exploits/20772 •

CVE-2001-0554 – Solaris 2.x/7.0/8 / IRIX 6.5.x / OpenBSD 2.x / NetBSD 1.x / Debian 3 / HP-UX 10 - 'TelnetD' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0554
14 Aug 2001 — Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote attackers to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function. • https://www.exploit-db.com/exploits/21018 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •