First published: Thu May 24 2001(Updated: )
Multiple buffer overflows in ePerl before 2.2.14-0.7 allow local and remote attackers to execute arbitrary commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ePerl | =2.2.13 | |
ePerl | =2.2.12 | |
Mandrake Linux | =7.2 | |
Debian | =2.2 | |
Mandrake Linux | =7.1 | |
SUSE Linux | =7.0 | |
SUSE Linux | =7.1 | |
SUSE Linux | =6.3 | |
SUSE Linux | =6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0458 is considered to have a high severity due to the potential for remote code execution.
To fix CVE-2001-0458, upgrade to ePerl version 2.2.14 or later.
CVE-2001-0458 affects specific versions of ePerl, as well as various Linux distributions such as Mandrake and SUSE.
Yes, CVE-2001-0458 can be exploited by both local and remote attackers.
Exploiting CVE-2001-0458 allows attackers to execute arbitrary commands on the affected systems.