First published: Thu May 24 2001(Updated: )
Buffer overflow in FTP server in HPUX 11 allows remote attackers to execute arbitrary commands by creating a long pathname and calling the STAT command, which uses glob to generate long strings.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HPE HP-UX | =11.00 | |
SGI IRIX | =6.5 | |
SGI IRIX | =6.5.1 | |
SGI IRIX | =6.5.2 | |
HPE HP-UX | =10.30 | |
HPE HP-UX | =10.00 | |
HPE HP-UX | =10.20 | |
HPE HP-UX | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0248 is rated as a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary commands.
To fix CVE-2001-0248, apply the relevant patches from HPE for HP-UX or SGI for IRIX, and consider disabling the FTP service if not needed.
CVE-2001-0248 affects HPUX versions 10.00, 10.10, 10.20, 10.30, and 11.00, as well as SGI IRIX versions 6.5, 6.5.1, and 6.5.2.
Attackers can exploit CVE-2001-0248 to execute arbitrary commands on affected systems due to a buffer overflow vulnerability.
Yes, CVE-2001-0248 specifically affects the FTP server implementation in HP-UX and SGI IRIX, allowing exploitation through crafted commands.