First published: Mon Mar 12 2001(Updated: )
Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zope ZODB | <=2.2.4 | |
Conectiva Linux | =4.2 | |
Conectiva Linux | =6.0 | |
Conectiva Linux | =5.1 | |
Red Hat Linux Powertools | =6.1 | |
Red Hat Linux Powertools | =7.0 | |
Conectiva Linux | =5.0 | |
Red Hat Linux Powertools | =6.2 | |
Mandrake Linux | =7.2 | |
Debian Linux | =2.2 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 | |
Mandrake Linux | =7.1 | |
FreeBSD Kernel | =6.2-stable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0128 is classified as a medium severity vulnerability due to its potential to allow users to bypass access controls.
To fix CVE-2001-0128, upgrade Zope to version 2.2.4 or later.
CVE-2001-0128 affects multiple Linux distributions and Zope versions prior to 2.2.4.
Users of Zope prior to version 2.2.4 may be impacted by CVE-2001-0128 due to improper local role computations.
There are no known workarounds for CVE-2001-0128, so upgrading to a patched version is recommended.