First published: Mon Sep 10 2001(Updated: )
Bugzilla before 2.14 does not restrict access to sanitycheck.cgi, which allows local users to cause a denial of service (CPU consumption) via a flood of requests to sanitycheck.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Bugzilla | =2.10 | |
Mozilla Bugzilla | =2.6 | |
Mozilla Bugzilla | =2.4 | |
Mozilla Bugzilla | =2.12 | |
Mozilla Bugzilla | =2.8 | |
Mozilla Bugzilla | =2.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1405 is considered a denial of service vulnerability that may lead to significant CPU consumption.
To fix CVE-2001-1405, upgrade to Bugzilla version 2.14 or later to restrict access to sanitycheck.cgi.
CVE-2001-1405 affects Bugzilla versions 2.10, 2.4, 2.6, 2.8, and 2.12.
CVE-2001-1405 does not specify remote exploitation, as it primarily impacts local users by generating excessive requests.
Exploiting CVE-2001-1405 can lead to service disruption by overwhelming the server with requests, causing a denial of service.