First published: Mon Mar 26 2001(Updated: )
Buffer overflow in micq client 0.4.6 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long Description field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Matthew Smith micq | <=0.4.6 | |
Debian GNU/Linux | =2.2 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.2 | |
Red Hat Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0233 is considered a critical vulnerability due to its potential for remote code execution and denial of service.
To mitigate CVE-2001-0233, you should upgrade the micq client to version 0.4.7 or later.
CVE-2001-0233 affects micq client version 0.4.6 and earlier.
Yes, CVE-2001-0233 is exploitable remotely through a long Description field.
Systems running micq client 0.4.6 or earlier, particularly on Debian and Red Hat Linux versions mentioned, are susceptible to CVE-2001-0233.