First published: Thu May 24 2001(Updated: )
Buffer overflow in (1) wrapping and (2) unwrapping functions of slrn news reader before 0.9.7.0 allows remote attackers to execute arbitrary commands via a long message header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mandrake Linux | =7.2 | |
Red Hat Linux | =7.0 | |
Mandrake Linux | =7.0 | |
Red Hat Linux | =6.2 | |
Mandriva Linux Corporate Server | =1.0.1 | |
Mandrake Linux | =7.1 | |
Mandrake Linux | =6.0 | |
Debian GNU/Linux | <=2.2 | |
Mandrake Linux | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0441 is considered to have a high severity due to its potential to allow remote attackers to execute arbitrary commands.
To fix CVE-2001-0441, you should upgrade the slrn news reader to version 0.9.7.0 or later.
CVE-2001-0441 affects several versions of slrn news reader on various Linux distributions, including Mandrake and Red Hat.
CVE-2001-0441 can be exploited through buffer overflow attacks that send long message headers to the affected news reader.
CVE-2001-0441 is less of a concern in modern systems since it affects outdated software versions, but systems running vulnerable versions should be updated.