First published: Mon Mar 12 2001(Updated: )
Buffer overflow in arp command in Solaris 7 and earlier allows local users to execute arbitrary commands via a long -f parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris and Zettabyte File System (ZFS) | =2.4 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.5.1 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.5 | |
Sun SunOS | =5.7 | |
Sun SunOS | =5.5 | |
Oracle Solaris and Zettabyte File System (ZFS) | =7.0 | |
Sun SunOS | =5.4 | |
Sun SunOS | =5.5.1 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.6 | |
Sun SunOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0115 is classified as a high severity vulnerability due to the potential for local users to execute arbitrary commands.
To fix CVE-2001-0115, users should update to a patched version of Solaris that addresses the buffer overflow in the arp command.
CVE-2001-0115 affects Solaris 7 and earlier, including specific versions like Solaris 2.4, 2.5, and 2.6.
Local users with access to affected Solaris systems are at risk from the CVE-2001-0115 vulnerability.
CVE-2001-0115 is a buffer overflow vulnerability that allows local users to execute arbitrary commands via the arp command.