CVE-2001-0797 (CNNVD-200112-095)
中文标题:
System V系统Login远程缓冲区溢出漏洞
英文标题:
Buffer overflow in login in various System V based operating systems allows remote attackers to exec...
漏洞描述
中文描述:
一些应用程序使用login认证登录系统。源于System V的login含有一个可远程被利用的缓冲区溢出漏洞。攻击者可以利用这一漏洞获得服务器的root权限。 一些源于System Vlogin的实现使用户可以向该进程提交具体参数,如环境变量。许多缓冲区被用来存放这些参数。但是程序在接受的参数数目检查过程中存在一个漏洞,可导致缓冲区数组发生溢出。 大多数系统中login没有设置suid属性;因此它以调用它的用户的身份运行。如果调用login的应用程序为suid (或sgid) root,那么本地用户就可以获得root用户的权限。如果权限比这些用户大的应用程序,如telnetd或rlogind调用login时,用户就可以利用这一漏洞获得该程序的权限。如果该程序为telnetd或rlogind,用户就可以获得root权限。 由于in.telnetd和in.rlogind可以通过网络提供服务,所以没有本地帐号的远程攻击者也可以利用本漏洞获得该系统的root权限。 目前已发现了一个攻击代码,且该代码可能正在流传。
英文描述:
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| sgi | irix | 3.2 | - | - |
cpe:2.3:o:sgi:irix:3.2:*:*:*:*:*:*:*
|
| sgi | irix | 3.3 | - | - |
cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*
|
| sgi | irix | 3.3.1 | - | - |
cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*
|
| sgi | irix | 3.3.2 | - | - |
cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*
|
| sgi | irix | 3.3.3 | - | - |
cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*
|
| hp | hp-ux | 10.00 | - | - |
cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*
|
| hp | hp-ux | 10.01 | - | - |
cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*
|
| hp | hp-ux | 10.10 | - | - |
cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*
|
| hp | hp-ux | 10.20 | - | - |
cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*
|
| hp | hp-ux | 10.24 | - | - |
cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*
|
| hp | hp-ux | 11.00 | - | - |
cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
|
| hp | hp-ux | 11.0.4 | - | - |
cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*
|
| hp | hp-ux | 11.11 | - | - |
cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
|
| ibm | aix | 4.3 | - | - |
cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*
|
| ibm | aix | 4.3.1 | - | - |
cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*
|
| ibm | aix | 4.3.2 | - | - |
cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*
|
| ibm | aix | 4.3.3 | - | - |
cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*
|
| ibm | aix | 5.1 | - | - |
cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*
|
| sco | openserver | 5.0 | - | - |
cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*
|
| sco | openserver | 5.0.1 | - | - |
cpe:2.3:o:sco:openserver:5.0.1:*:*:*:*:*:*:*
|
| sco | openserver | 5.0.2 | - | - |
cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*
|
| sco | openserver | 5.0.3 | - | - |
cpe:2.3:o:sco:openserver:5.0.3:*:*:*:*:*:*:*
|
| sco | openserver | 5.0.4 | - | - |
cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*
|
| sco | openserver | 5.0.5 | - | - |
cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*
|
| sco | openserver | 5.0.6 | - | - |
cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*
|
| sco | openserver | 5.0.6a | - | - |
cpe:2.3:o:sco:openserver:5.0.6a:*:*:*:*:*:*:*
|
| sun | solaris | 2.4 | - | - |
cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*
|
| sun | solaris | 2.5 | - | - |
cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*
|
| sun | solaris | 2.5.1 | - | - |
cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*
|
| sun | solaris | 2.6 | - | - |
cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
|
| sun | solaris | 7.0 | - | - |
cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*
|
| sun | solaris | 8.0 | - | - |
cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
|
| sun | sunos | - | - | - |
cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*
|
| sun | sunos | 5.0 | - | - |
cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*
|
| sun | sunos | 5.1 | - | - |
cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*
|
| sun | sunos | 5.2 | - | - |
cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*
|
| sun | sunos | 5.3 | - | - |
cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*
|
| sun | sunos | 5.4 | - | - |
cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*
|
| sun | sunos | 5.5 | - | - |
cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*
|
| sun | sunos | 5.5.1 | - | - |
cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
|
| sun | sunos | 5.7 | - | - |
cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
|
| sun | sunos | 5.8 | - | - |
cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
exploitdb
CVSS评分详情
AV:N/AC:L/Au:N/C:C/I:C/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2001-0797 |
2025-11-11 15:17:22 | 2025-11-11 07:32:14 |
| NVD | nvd_CVE-2001-0797 |
2025-11-11 14:50:26 | 2025-11-11 07:41:00 |
| CNNVD | cnnvd_CNNVD-200112-095 |
2025-11-11 15:08:40 | 2025-11-11 07:48:47 |
| EXPLOITDB | exploitdb_EDB-10036 |
2025-11-11 15:05:48 | 2025-11-11 08:00:24 |
| EXPLOITDB | exploitdb_EDB-16327 |
2025-11-11 15:05:48 | 2025-11-11 08:10:59 |
| EXPLOITDB | exploitdb_EDB-16928 |
2025-11-11 15:05:26 | 2025-11-11 08:11:17 |
| EXPLOITDB | exploitdb_EDB-21179 |
2025-11-11 15:05:48 | 2025-11-11 08:16:09 |
| EXPLOITDB | exploitdb_EDB-346 |
2025-11-11 15:05:26 | 2025-11-11 08:30:06 |
| EXPLOITDB | exploitdb_EDB-57 |
2025-11-11 15:05:48 | 2025-11-11 09:02:56 |
| EXPLOITDB | exploitdb_EDB-716 |
2025-11-11 15:05:48 | 2025-11-11 09:03:34 |
| EXPLOITDB | exploitdb_EDB-9917 |
2025-11-11 15:05:48 | 2025-11-11 09:07:03 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 27 -> 29
- tags_count: 12 -> 13
查看详细变更
- references_count: 25 -> 27
- tags_count: 11 -> 12
查看详细变更
- references_count: 23 -> 25
- tags_count: 10 -> 11
查看详细变更
- references_count: 21 -> 23
- tags_count: 8 -> 10
查看详细变更
- references_count: 19 -> 21
- tags_count: 7 -> 8
查看详细变更
- references_count: 17 -> 19
- tags_count: 5 -> 7
查看详细变更
- references_count: 15 -> 17
- tags_count: 4 -> 5
查看详细变更
- references_count: 12 -> 15
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200112-095
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 10.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 42
- data_sources: ['cve'] -> ['cve', 'nvd']