// For flags

CVE-2001-0641

Immunix OS 6.2/7.0 / RedHat 5.2/6.2/7.0 / SuSE Linux 6.x/7.0/7.1 - 'Man -S' Heap Overflow

Severity Score

4.6
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Buffer overflow in man program in various distributions of Linux allows local user to execute arbitrary code as group man via a long -S option.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2001-05-13 First Exploit
  • 2001-08-06 CVE Reserved
  • 2001-09-20 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Immunix
Search vendor "Immunix"
Immunix
Search vendor "Immunix" for product "Immunix"
6.2
Search vendor "Immunix" for product "Immunix" and version "6.2"
-
Affected
Immunix
Search vendor "Immunix"
Immunix
Search vendor "Immunix" for product "Immunix"
7.0
Search vendor "Immunix" for product "Immunix" and version "7.0"
-
Affected
Immunix
Search vendor "Immunix"
Immunix
Search vendor "Immunix" for product "Immunix"
7.0_beta
Search vendor "Immunix" for product "Immunix" and version "7.0_beta"
-
Affected
Redhat
Search vendor "Redhat"
Linux
Search vendor "Redhat" for product "Linux"
5.2
Search vendor "Redhat" for product "Linux" and version "5.2"
-
Affected
Redhat
Search vendor "Redhat"
Linux
Search vendor "Redhat" for product "Linux"
6.2
Search vendor "Redhat" for product "Linux" and version "6.2"
-
Affected
Redhat
Search vendor "Redhat"
Linux
Search vendor "Redhat" for product "Linux"
7.0
Search vendor "Redhat" for product "Linux" and version "7.0"
-
Affected
Suse
Search vendor "Suse"
Suse Linux
Search vendor "Suse" for product "Suse Linux"
6.0
Search vendor "Suse" for product "Suse Linux" and version "6.0"
-
Affected
Suse
Search vendor "Suse"
Suse Linux
Search vendor "Suse" for product "Suse Linux"
6.1
Search vendor "Suse" for product "Suse Linux" and version "6.1"
-
Affected
Suse
Search vendor "Suse"
Suse Linux
Search vendor "Suse" for product "Suse Linux"
6.2
Search vendor "Suse" for product "Suse Linux" and version "6.2"
-
Affected
Suse
Search vendor "Suse"
Suse Linux
Search vendor "Suse" for product "Suse Linux"
6.3
Search vendor "Suse" for product "Suse Linux" and version "6.3"
-
Affected
Suse
Search vendor "Suse"
Suse Linux
Search vendor "Suse" for product "Suse Linux"
6.4
Search vendor "Suse" for product "Suse Linux" and version "6.4"
-
Affected
Suse
Search vendor "Suse"
Suse Linux
Search vendor "Suse" for product "Suse Linux"
7.0
Search vendor "Suse" for product "Suse Linux" and version "7.0"
-
Affected
Suse
Search vendor "Suse"
Suse Linux
Search vendor "Suse" for product "Suse Linux"
7.1
Search vendor "Suse" for product "Suse Linux" and version "7.1"
-
Affected