ID

VAR-200106-0170


CVE

CVE-2001-0414


TITLE

Ntpd Remote Buffer Overflow Vulnerability

Trust: 0.9

sources: BID: 2540 // CNNVD: CNNVD-200106-110

DESCRIPTION

Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long readvar argument. There is a buffer overflow defect in the ctl_getitem() function of the Network Time Protocol (NTP) daemon responsible for providing accurate time reports used for synchronizing the clocks on installed systems. All NTP daemons based on code maintained at the University of Delaware since NTPv2 are assumed at risk. The Lotus Domino Web Server contains a flaw that could be exploited to cause a denial of service. Due to a problem parsing carriage return/line feeds in RFC822 format mail messages, The Bat! mail client may permaturely detect the end of a mail message, causing an error to occur. This error may prevent the mail user from retrieving other mail messages until the message with the error is removed. NTP, the Network Time Protocol, is used to synchronize the time between a computer and another system or time reference. It uses UDP as a transport protocol. There are two protocol versions in use: NTP v3 and NTP v4. The 'ntpd' daemon implementing version 3 is called 'xntp3'; the version implementing version 4 is called 'ntp'. On UNIX systems, the 'ntpd' daemon is available to regularly synchronize system time with internet time servers. Many versions of 'ntpd' are prone to a remotely exploitable buffer-overflow issue. A remote attacker may be able to crash the daemon or execute arbitrary code on the host. If successful, the attacker may gain root access on the victim host or may denial NTP service on the affected host. Submitting numerous HTTP requests with modified headers, could cause Lotus Domino to consume all available system resources. -----BEGIN PGP SIGNED MESSAGE----- Internet Security Systems Security Alert Summary May 10, 2001 Volume 6 Number 6 X-Force Vulnerability and Threat Database: http://xforce.iss.net/ To receive these Alert Summaries as well as other Alerts and Advisories, subscribe to the Internet Security Systems Alert mailing list at: http://xforce.iss.net/maillists/index.php This summary can be found at: http://xforce.iss.net/alerts/vol-6_num-6.php _____ Contents: * 120 Reported Vulnerabilities * Risk Factor Key _____ Date Reported: 04/02/2001 Brief Description: The Bat! masked file type in email attachment could allow execution of code Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: The Bat! 1.49 and earlier Vulnerability: thebat-masked-file-type X-Force URL: http://xforce.iss.net/static/6324.php Date Reported: 04/02/2001 Brief Description: PHP-Nuke could allow attackers to redirect ad banner URL links Risk Factor: Medium Attack Type: Network Based Platforms Affected: PHP-Nuke 4.4 and earlier Vulnerability: php-nuke-url-redirect X-Force URL: http://xforce.iss.net/static/6342.php Date Reported: 04/03/2001 Brief Description: Orinoco RG-1000 Residential Gateway default SSID reveals WEP encryption key Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Orinoco Residential Gateway RG-1000 Vulnerability: orinoco-rg1000-wep-key X-Force URL: http://xforce.iss.net/static/6328.php Date Reported: 04/03/2001 Brief Description: Navision Financials server denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Navision Financials 2.5 and 2.6 Vulnerability: navision-server-dos X-Force URL: http://xforce.iss.net/static/6318.php Date Reported: 04/03/2001 Brief Description: uStorekeeper online shopping system allows remote file retrieval Risk Factor: Medium Attack Type: Network Based Platforms Affected: uStorekeeper 1.61 Vulnerability: ustorekeeper-retrieve-files X-Force URL: http://xforce.iss.net/static/6319.php Date Reported: 04/03/2001 Brief Description: Resin server allows remote attackers to view Javabean files Risk Factor: Medium Attack Type: Network Based Platforms Affected: Resin 1.2.x, Resin 1.3b1 Vulnerability: resin-view-javabean X-Force URL: http://xforce.iss.net/static/6320.php Date Reported: 04/03/2001 Brief Description: BPFTP could allow attackers to obtain login credentials Risk Factor: High Attack Type: Network Based Platforms Affected: BPFTP 2.0 Vulnerability: bpftp-obtain-credentials X-Force URL: http://xforce.iss.net/static/6330.php Date Reported: 04/04/2001 Brief Description: Ntpd server readvar control message buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: SCO Openserver 5.0.0 to 5.0.6, AIX 5.1, Slackware Linux 7.1, Engarde Secure Linux 1.0.1, Progeny Linux, SuSE Linux 7.1, ntpd 4.0.99k and earlier, FreeBSD 4.2-Stable, Mandrake Linux Corporate Server 1.0.1, Mandrake Linux 7.2, Trustix Secure Linux, Immunix Linux 7.0, NetBSD 1.5, SuSE Linux 7.0, Caldera OpenLinux eServer 2.3.1 Vulnerability: ntpd-remote-bo X-Force URL: http://xforce.iss.net/static/6321.php Date Reported: 04/04/2001 Brief Description: Cisco CSS debug mode allows users to gain administrative access Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Cisco Content Services Switch 11050, Cisco Content Services Switch 11150, Cisco Content Services Switch 11800 Vulnerability: cisco-css-elevate-privileges X-Force URL: http://xforce.iss.net/static/6322.php Date Reported: 04/04/2001 Brief Description: BEA Tuxedo may allow access to remote services Risk Factor: Medium Attack Type: Network Based Platforms Affected: BEA Tuxedo 7.1 Vulnerability: bea-tuxedo-remote-access X-Force URL: http://xforce.iss.net/static/6326.php Date Reported: 04/05/2001 Brief Description: Ultimate Bulletin Board could allow attackers to bypass authentication Risk Factor: High Attack Type: Network Based Platforms Affected: Ultimate Bulletin Board 5.43, Ultimate Bulletin Board 5.4.7e Vulnerability: ultimatebb-bypass-authentication X-Force URL: http://xforce.iss.net/static/6339.php Date Reported: 04/05/2001 Brief Description: BinTec X4000 NMAP denial of service Risk Factor: Low Attack Type: Network Based Platforms Affected: BinTec X4000 5.1.6P10 and prior, BinTec X1000, BinTec X1200 Vulnerability: bintec-x4000-nmap-dos X-Force URL: http://xforce.iss.net/static/6323.php Date Reported: 04/05/2001 Brief Description: WatchGuard Firebox II kernel denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: WatchGuard Firebox II prior to 4.6 Vulnerability: firebox-kernel-dos X-Force URL: http://xforce.iss.net/static/6327.php Date Reported: 04/06/2001 Brief Description: Cisco PIX denial of service due to multiple TACACS+ requests Risk Factor: Medium Attack Type: Network Based Platforms Affected: Cisco PIX Firewall 5.1.4 Vulnerability: cisco-pix-tacacs-dos X-Force URL: http://xforce.iss.net/static/6353.php Date Reported: 04/06/2001 Brief Description: Darren Reed's IP Filter allows attackers to access UDP and TCP ports Risk Factor: Medium Attack Type: Network Based Platforms Affected: IP Filter 3.4.16 Vulnerability: ipfilter-access-ports X-Force URL: http://xforce.iss.net/static/6331.php Date Reported: 04/06/2001 Brief Description: Veritas NetBackup nc (netcat) command denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: NetBackup 3.2 Vulnerability: veritas-netbackup-nc-dos X-Force URL: http://xforce.iss.net/static/6329.php Date Reported: 04/08/2001 Brief Description: PGP may allow malicious users to access authenticated split keys Risk Factor: Medium Attack Type: Host Based Platforms Affected: PGP 7.0 Vulnerability: nai-pgp-split-keys X-Force URL: http://xforce.iss.net/static/6341.php Date Reported: 04/09/2001 Brief Description: Solaris kcms_configure command line buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 7, Solaris 8 Vulnerability: solaris-kcms-command-bo X-Force URL: http://xforce.iss.net/static/6359.php Date Reported: 04/09/2001 Brief Description: TalkBack CGI script could allow remote attackers to read files on the Web server Risk Factor: Medium Attack Type: Network Based Platforms Affected: TalkBack prior to 1.2 Vulnerability: talkback-cgi-read-files X-Force URL: http://xforce.iss.net/static/6340.php Date Reported: 04/09/2001 Brief Description: Multiple FTP glob(3) implementation Risk Factor: Low Attack Type: Network Based Platforms Affected: FreeBSD 4.2, Solaris 8, IRIX 6.5.x, OpenBSD 2.8, HP-UX 11.00, NetBSD Vulnerability: ftp-glob-implementation X-Force URL: http://xforce.iss.net/static/6333.php Date Reported: 04/09/2001 Brief Description: Pine mail client temp file symbolic link Risk Factor: Medium Attack Type: Host Based Platforms Affected: Pine prior to 4.33, Red Hat Linux 5.2, Red Hat Linux 6.2, Red Hat Linux 7.0 Vulnerability: pine-tmp-file-symlink X-Force URL: http://xforce.iss.net/static/6367.php Date Reported: 04/09/2001 Brief Description: Multiple FTP glob(3) expansion Risk Factor: Low Attack Type: Network Based Platforms Affected: HP-UX 11.00, NetBSD, Solaris 8, IRIX 6.5.x, OpenBSD 2.8, FreeBSD 4.2, MIT Kerberos 5 Vulnerability: ftp-glob-expansion X-Force URL: http://xforce.iss.net/static/6332.php Date Reported: 04/09/2001 Brief Description: Netscape embedded JavaScript in GIF file comments can be used to access remote data Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: Netscape Communicator 4.76, Red Hat Linux 6.2, Debian Linux 2.2, Conectiva Linux, Red Hat Linux 7.0, Immunix Linux 6.2, Immunix Linux 7.0 Beta, Red Hat Linux 7.1 Vulnerability: netscape-javascript-access-data X-Force URL: http://xforce.iss.net/static/6344.php Date Reported: 04/09/2001 Brief Description: STRIP generates weak passwords Risk Factor: Low Attack Type: Host Based Platforms Affected: STRIP 0.5 and earlier Vulnerability: strip-weak-passwords X-Force URL: http://xforce.iss.net/static/6362.php Date Reported: 04/10/2001 Brief Description: Solaris Xsun HOME environment variable buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 7 Vulnerability: solaris-xsun-home-bo X-Force URL: http://xforce.iss.net/static/6343.php Date Reported: 04/10/2001 Brief Description: Compaq Presario Active X denial of service Risk Factor: Low Attack Type: Network Based Platforms Affected: Compaq Presario, Windows 98, Windows ME Vulnerability: compaq-activex-dos X-Force URL: http://xforce.iss.net/static/6355.php Date Reported: 04/10/2001 Brief Description: Alcatel ADSL modems 'EXPERT' account Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Alcatel ADSL Network Termination Device 1000, Alcatel Speed Touch ADSL modem Home Vulnerability: alcatel-expert-account X-Force URL: http://xforce.iss.net/static/6354.php Date Reported: 04/10/2001 Brief Description: Alcatel ADSL modems allow attacker on LAN to gain access using TFTP Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Alcatel ADSL Network Termination Device 1000, Alcatel Speed Touch ADSL modem Home Vulnerability: alcatel-tftp-lan-access X-Force URL: http://xforce.iss.net/static/6336.php Date Reported: 04/10/2001 Brief Description: Alcatel ADSL modems allow attacker on WAN to gain access using TFTP Risk Factor: Low Attack Type: Network Based Platforms Affected: Alcatel ADSL Network Termination Device 1000, Alcatel Speed Touch ADSL modem Home Vulnerability: alcatel-tftp-wan-access X-Force URL: http://xforce.iss.net/static/6337.php Date Reported: 04/10/2001 Brief Description: Oracle Application Server shared library (ndwfn4.so) buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: iPlanet Web Server 4.x, Oracle Application Server 4.0.8.2 Vulnerability: oracle-appserver-ndwfn4-bo X-Force URL: http://xforce.iss.net/static/6334.php Date Reported: 04/10/2001 Brief Description: Alcatel ADSL modems use blank password by default Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Alcatel ADSL Network Termination Device 1000, Alcatel Speed Touch ADSL modem Home Vulnerability: alcatel-blank-password X-Force URL: http://xforce.iss.net/static/6335.php Date Reported: 04/11/2001 Brief Description: Solaris dtsession buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 7 Vulnerability: solaris-dtsession-bo X-Force URL: http://xforce.iss.net/static/6366.php Date Reported: 04/11/2001 Brief Description: Solaris kcsSUNWIOsolf.so buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Solaris 7, Solaris 8 Vulnerability: solaris-kcssunwiosolf-bo X-Force URL: http://xforce.iss.net/static/6365.php Date Reported: 04/11/2001 Brief Description: Lightwave ConsoleServer brute force password attack Risk Factor: High Attack Type: Network Based Platforms Affected: Lightwave ConsoleServer 3200 Vulnerability: lightwave-consoleserver-brute-force X-Force URL: http://xforce.iss.net/static/6345.php Date Reported: 04/11/2001 Brief Description: nph-maillist allows user to execute code Risk Factor: Low Attack Type: Host Based Platforms Affected: Email List Generator 3.5 and earlier Vulnerability: nph-maillist-execute-code X-Force URL: http://xforce.iss.net/static/6363.php Date Reported: 04/11/2001 Brief Description: Symantec Ghost Configuration Server denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Ghost 6.5 Vulnerability: ghost-configuration-server-dos X-Force URL: http://xforce.iss.net/static/6357.php Date Reported: 04/11/2001 Brief Description: Lotus Domino Web Server DOS device denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Lotus Domino R5 prior to 5.0.7 Vulnerability: lotus-domino-device-dos X-Force URL: http://xforce.iss.net/static/6348.php Date Reported: 04/11/2001 Brief Description: Lotus Domino Web Server HTTP header denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Lotus Domino R5 prior to 5.0.7 Vulnerability: lotus-domino-header-dos X-Force URL: http://xforce.iss.net/static/6347.php Date Reported: 04/11/2001 Brief Description: Lotus Domino Web Server URL parsing denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Lotus Domino R5 prior to 5.0.7 Vulnerability: lotus-domino-url-dos X-Force URL: http://xforce.iss.net/static/6351.php Date Reported: 04/11/2001 Brief Description: Lotus Domino Web Server CORBA denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Lotus Domino R5 prior to 5.0.7 Vulnerability: lotus-domino-corba-dos X-Force URL: http://xforce.iss.net/static/6350.php Date Reported: 04/11/2001 Brief Description: Symantec Ghost database engine denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Ghost 6.5, Sybase Adaptive Server Database Engine 6.0.3.2747 Vulnerability: ghost-database-engine-dos X-Force URL: http://xforce.iss.net/static/6356.php Date Reported: 04/11/2001 Brief Description: cfingerd daemon remote format string Risk Factor: Low Attack Type: Network Based Platforms Affected: Debian Linux 2.1, Debian Linux 2.2, cfingerd 1.4.3 and earlier Vulnerability: cfingerd-remote-format-string X-Force URL: http://xforce.iss.net/static/6364.php Date Reported: 04/11/2001 Brief Description: Lotus Domino Web Server Unicode denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Lotus Domino R5 prior to 5.0.7 Vulnerability: lotus-domino-unicode-dos X-Force URL: http://xforce.iss.net/static/6349.php Date Reported: 04/11/2001 Brief Description: Linux mkpasswd generates weak passwords Risk Factor: High Attack Type: Host Based Platforms Affected: Red Hat Linux 6.2, Red Hat Linux 7.0, mkpasswd Vulnerability: mkpasswd-weak-passwords X-Force URL: http://xforce.iss.net/static/6382.php Date Reported: 04/12/2001 Brief Description: Solaris ipcs utility buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: Solaris 7 Vulnerability: solaris-ipcs-bo X-Force URL: http://xforce.iss.net/static/6369.php Date Reported: 04/12/2001 Brief Description: InterScan VirusWall ISADMIN service buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: Linux kernel , InterScan VirusWall 3.0.1 Vulnerability: interscan-viruswall-isadmin-bo X-Force URL: http://xforce.iss.net/static/6368.php Date Reported: 04/12/2001 Brief Description: HylaFAX hfaxd format string Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: HylaFAX 4.1B3 and prior, SuSE Linux 6.x, SuSE Linux 7.0, Mandrake Linux 7.1, FreeBSD 3.5.1, Mandrake Linux 7.2, Mandrake Linux Corporate Server 1.0.1, FreeBSD 4.2, SuSE Linux 7.1 Vulnerability: hylafax-hfaxd-format-string X-Force URL: http://xforce.iss.net/static/6377.php Date Reported: 04/12/2001 Brief Description: Cisco VPN 3000 Concentrators invalid IP Option denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Cisco VPN 3000 Concentrators prior to 2.5.2 F Vulnerability: cisco-vpn-ip-dos X-Force URL: http://xforce.iss.net/static/6360.php Date Reported: 04/13/2001 Brief Description: Net.Commerce package in IBM WebSphere reveals installation path Risk Factor: High Attack Type: Network Based Platforms Affected: IBM Websphere, Solaris 2.6, AIX 4.3.x, Solaris 7, Windows NT 4.0 Vulnerability: ibm-websphere-reveals-path X-Force URL: http://xforce.iss.net/static/6371.php Date Reported: 04/13/2001 Brief Description: QPC ftpd buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: QVT/Term 5.0, QVT/Net 5.0 Vulnerability: qpc-ftpd-bo X-Force URL: http://xforce.iss.net/static/6376.php Date Reported: 04/13/2001 Brief Description: QPC ftpd directory traversal Risk Factor: High Attack Type: Network Based Platforms Affected: QVT/Net 5.0, QVT/Term 5.0 Vulnerability: qpc-ftpd-directory-traversal X-Force URL: http://xforce.iss.net/static/6375.php Date Reported: 04/13/2001 Brief Description: QPC popd buffer overflow Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: QVT/Net 5.0 Vulnerability: qpc-popd-bo X-Force URL: http://xforce.iss.net/static/6374.php Date Reported: 04/13/2001 Brief Description: NCM Content Management System access database Risk Factor: Low Attack Type: Network Based Platforms Affected: NCM Content Management System Vulnerability: ncm-content-database-access X-Force URL: http://xforce.iss.net/static/6386.php Date Reported: 04/13/2001 Brief Description: Netscape SmartDownload 'sdph20.dll' buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Netscape SmartDownload 1.3, Windows NT, Windows 95, Windows 98 Vulnerability: netscape-smartdownload-sdph20-bo X-Force URL: http://xforce.iss.net/static/6403.php Date Reported: 04/13/2001 Brief Description: SCO OpenServer accept buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO Openserver 5.0.0 to 5.0.6 Vulnerability: sco-openserver-accept-bo X-Force URL: http://xforce.iss.net/static/6404.php Date Reported: 04/13/2001 Brief Description: SCO OpenServer cancel buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO Openserver 5.0.0 to 5.0.6 Vulnerability: sco-openserver-cancel-bo X-Force URL: http://xforce.iss.net/static/6406.php Date Reported: 04/13/2001 Brief Description: SCO OpenServer disable buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO Openserver 5.0.0 to 5.0.6 Vulnerability: sco-openserver-disable-bo X-Force URL: http://xforce.iss.net/static/6407.php Date Reported: 04/13/2001 Brief Description: SCO OpenServer enable buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO Openserver 5.0.0 to 5.0.6 Vulnerability: sco-openserver-enable-bo X-Force URL: http://xforce.iss.net/static/6409.php Date Reported: 04/13/2001 Brief Description: SCO OpenServer lp buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO Openserver 5.0.0 to 5.0.6 Vulnerability: sco-openserver-lp-bo X-Force URL: http://xforce.iss.net/static/6410.php Date Reported: 04/13/2001 Brief Description: SCO OpenServer lpfilter buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO Openserver 5.0.0 to 5.0.6 Vulnerability: sco-openserver-lpfilter-bo X-Force URL: http://xforce.iss.net/static/6411.php Date Reported: 04/13/2001 Brief Description: SCO OpenServer lpstat buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO Openserver 5.0.0 to 5.0.6 Vulnerability: sco-openserver-lpstat-bo X-Force URL: http://xforce.iss.net/static/6413.php Date Reported: 04/13/2001 Brief Description: SCO OpenServer reject buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO Openserver 5.0.0 to 5.0.6 Vulnerability: sco-openserver-reject-bo X-Force URL: http://xforce.iss.net/static/6414.php Date Reported: 04/13/2001 Brief Description: SCO OpenServer rmail buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO Openserver 5.0.0 to 5.0.6 Vulnerability: sco-openserver-rmail-bo X-Force URL: http://xforce.iss.net/static/6415.php Date Reported: 04/13/2001 Brief Description: SCO OpenServer tput buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO Openserver 5.0.0 to 5.0.6 Vulnerability: sco-openserver-tput-bo X-Force URL: http://xforce.iss.net/static/6416.php Date Reported: 04/13/2001 Brief Description: IBM WebSphere CGI macro denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: IBM Websphere, Windows NT 4.0, Solaris 2.6, AIX 4.3.x, Solaris 7 Vulnerability: ibm-websphere-macro-dos X-Force URL: http://xforce.iss.net/static/6372.php Date Reported: 04/13/2001 Brief Description: SCO OpenServer lpmove buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: SCO Openserver 5.0.0 to 5.0.6 Vulnerability: sco-openserver-lpmove-bo X-Force URL: http://xforce.iss.net/static/6412.php Date Reported: 04/14/2001 Brief Description: Siemens Reliant Unix ppd -T symlink Risk Factor: Medium Attack Type: Host Based Platforms Affected: Reliant Unix 5.45, Reliant Unix 5.43, Reliant Unix 5.44 Vulnerability: reliant-unix-ppd-symlink X-Force URL: http://xforce.iss.net/static/6408.php Date Reported: 04/15/2001 Brief Description: Linux Exuberant Ctags package symbolic link Risk Factor: Medium Attack Type: Host Based Platforms Affected: Debian Linux 2.2, exuberant-ctags Vulnerability: exuberant-ctags-symlink X-Force URL: http://xforce.iss.net/static/6388.php Date Reported: 04/15/2001 Brief Description: processit.pl CGI could allow attackers to view sensitive information about the Web server Risk Factor: Medium Attack Type: Network Based Platforms Affected: processit.pl Vulnerability: processit-cgi-view-info X-Force URL: http://xforce.iss.net/static/6385.php Date Reported: 04/16/2001 Brief Description: Microsoft ISA Server Web Proxy denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Microsoft ISA Server 2000 Vulnerability: isa-web-proxy-dos X-Force URL: http://xforce.iss.net/static/6383.php Date Reported: 04/16/2001 Brief Description: Microsoft Internet Explorer altering CLSID action allows malicious file execution Risk Factor: Low Attack Type: Host Based Platforms Affected: Windows 2000, Internet Explorer 5.5, Windows 98 Vulnerability: ie-clsid-execute-files X-Force URL: http://xforce.iss.net/static/6426.php Date Reported: 04/16/2001 Brief Description: Cisco Catalyst 5000 series switch 802.1x denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Cisco Catalyst 5000 Series Vulnerability: cisco-catalyst-8021x-dos X-Force URL: http://xforce.iss.net/static/6379.php Date Reported: 04/16/2001 Brief Description: BubbleMon allows users to gain elevated privileges Risk Factor: Low Attack Type: Host Based Platforms Affected: BubbleMon prior to 1.32, FreeBSD Vulnerability: bubblemon-elevate-privileges X-Force URL: http://xforce.iss.net/static/6378.php Date Reported: 04/16/2001 Brief Description: DCForum CGI az= field directory traversal Risk Factor: High Attack Type: Network Based Platforms Affected: DCForum 2000 1.0 Vulnerability: dcforum-az-directory-traversal X-Force URL: http://xforce.iss.net/static/6391.php Date Reported: 04/16/2001 Brief Description: DCForum CGI az= field allows attacker to upload files Risk Factor: Low Attack Type: Network Based Platforms Affected: DCForum 2000 1.0 Vulnerability: dcforum-az-file-upload X-Force URL: http://xforce.iss.net/static/6393.php Date Reported: 04/16/2001 Brief Description: DCForum CGI az= field EXPR allows attacker to execute commands Risk Factor: Low Attack Type: Network Based Platforms Affected: DCForum 2000 1.0 Vulnerability: dcforum-az-expr X-Force URL: http://xforce.iss.net/static/6392.php Date Reported: 04/16/2001 Brief Description: Linux NetFilter IPTables Risk Factor: Low Attack Type: Network Based Platforms Affected: Linux kernel 2.4, Red Hat Linux 7.1 Vulnerability: linux-netfilter-iptables X-Force URL: http://xforce.iss.net/static/6390.php Date Reported: 04/17/2001 Brief Description: Xitami Web server denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Xitami Web server 2.4d7, Xitami Web server 2.5b4 Vulnerability: xitami-server-dos X-Force URL: http://xforce.iss.net/static/6389.php Date Reported: 04/17/2001 Brief Description: Samba tmpfile symlink attack could allow elevated privileges Risk Factor: Low Attack Type: Host Based Platforms Affected: Trustix Secure Linux 1.2, Mandrake Linux 8.0, Progeny Linux, Caldera OpenLinux eBuilder, Trustix Secure Linux 1.01, Mandrake Linux Corporate Server 1.0.1, FreeBSD 4.2, Immunix Linux 7.0, Immunix Linux 6.2, Immunix Linux 7.0 Beta, Caldera OpenLinux eServer 2.3.1, Caldera OpenLinux eDesktop 2.4, FreeBSD 3.5.1 Vulnerability: samba-tmpfile-symlink X-Force URL: http://xforce.iss.net/static/6396.php Date Reported: 04/17/2001 Brief Description: GoAhead WebServer "aux" denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: GoAhead Web Server 2.1, Windows 98, Windows ME Vulnerability: goahead-aux-dos X-Force URL: http://xforce.iss.net/static/6400.php Date Reported: 04/17/2001 Brief Description: AnalogX SimpleServer:WWW "aux" denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: SimpleServer:WWW 1.03 to 1.08 Vulnerability: analogx-simpleserver-aux-dos X-Force URL: http://xforce.iss.net/static/6395.php Date Reported: 04/17/2001 Brief Description: Viking Server hexadecimal URL encoded format directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: Viking Server prior to 1.07-381 Vulnerability: viking-hex-directory-traversal X-Force URL: http://xforce.iss.net/static/6394.php Date Reported: 04/17/2001 Brief Description: Solaris FTP server allows attacker to recover shadow file Risk Factor: Medium Attack Type: Host Based Platforms Affected: Solaris 2.6 Vulnerability: solaris-ftp-shadow-recovery X-Force URL: http://xforce.iss.net/static/6422.php Date Reported: 04/18/2001 Brief Description: The Bat! pop3 denial of service Risk Factor: High Attack Type: Network Based Platforms Affected: The Bat! 1.51, Windows Vulnerability: thebat-pop3-dos X-Force URL: http://xforce.iss.net/static/6423.php Date Reported: 04/18/2001 Brief Description: Eudora allows attacker to obtain files using plain text attachments Risk Factor: Medium Attack Type: Network Based Platforms Affected: Eudora 5.0.2 Vulnerability: eudora-plain-text-attachment X-Force URL: http://xforce.iss.net/static/6431.php Date Reported: 04/18/2001 Brief Description: VMware vmware-mount.pl symlink Risk Factor: Medium Attack Type: Host Based Platforms Affected: VMware Vulnerability: vmware-mount-symlink X-Force URL: http://xforce.iss.net/static/6420.php Date Reported: 04/18/2001 Brief Description: KFM tmpfile symbolic link could allow local attackers to overwrite files Risk Factor: Medium Attack Type: Host Based Platforms Affected: SuSE Linux 7.0, K File Manager (KFM) Vulnerability: kfm-tmpfile-symlink X-Force URL: http://xforce.iss.net/static/6428.php Date Reported: 04/18/2001 Brief Description: CyberScheduler timezone remote buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: CyberScheduler, Mandrake Linux, Windows 2000, IIS 5.0, Solaris 8, SuSE Linux, Solaris 7, Slackware Linux, Red Hat Linux, IIS 4.0, Debian Linux, Solaris 2.5, Solaris 2.6, Caldera OpenLinux, Windows NT Vulnerability: cyberscheduler-timezone-bo X-Force URL: http://xforce.iss.net/static/6401.php Date Reported: 04/18/2001 Brief Description: Microsoft Data Access Component Internet Publishing Provider allows WebDAV access Risk Factor: Medium Attack Type: Network Based Platforms Affected: Microsoft Data Access Component 8.103.2519.0, Windows 95, Windows NT 4.0, Windows 98, Windows 98 Second Edition, Windows 2000, Windows ME Vulnerability: ms-dacipp-webdav-access X-Force URL: http://xforce.iss.net/static/6405.php Date Reported: 04/18/2001 Brief Description: Oracle tnslsnr80.exe denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Oracle 8.x, Windows NT 4.0 SP6, Solaris 8 Vulnerability: oracle-tnslsnr80-dos X-Force URL: http://xforce.iss.net/static/6427.php Date Reported: 04/18/2001 Brief Description: innfeed -c flag buffer overflow Risk Factor: Low Attack Type: Host Based Platforms Affected: Red Hat Linux, Slackware Linux, Mandrake Linux, INN prior to 2.3.1 Vulnerability: innfeed-c-bo X-Force URL: http://xforce.iss.net/static/6398.php Date Reported: 04/18/2001 Brief Description: iPlanet Calendar Server stores username and password in plaintext Risk Factor: Low Attack Type: Host Based Platforms Affected: iPlanet Calendar Server 5.0p2 Vulnerability: iplanet-calendar-plaintext-password X-Force URL: http://xforce.iss.net/static/6402.php Date Reported: 04/18/2001 Brief Description: Linux NEdit symlink when printing Risk Factor: High Attack Type: Host Based Platforms Affected: SuSE Linux 6.3, SuSE Linux 6.4, Debian Linux 2.2, Mandrake Linux 7.1, Mandrake Linux 7.2, SuSE Linux 7.0, Mandrake Linux Corporate Server 1.0.1, SuSE Linux 7.1, Mandrake Linux 8.0 Vulnerability: nedit-print-symlink X-Force URL: http://xforce.iss.net/static/6424.php Date Reported: 04/19/2001 Brief Description: CheckBO TCP buffer overflow Risk Factor: Medium Attack Type: Network Based Platforms Affected: CheckBO 1.56 and earlier Vulnerability: checkbo-tcp-bo X-Force URL: http://xforce.iss.net/static/6436.php Date Reported: 04/19/2001 Brief Description: HP-UX pcltotiff uses insecure permissions Risk Factor: Medium Attack Type: Host Based Platforms Affected: HP-UX 10.01, HP-UX 10.10, HP-UX 10.20, HP-UX 10.26 Vulnerability: hp-pcltotiff-insecure-permissions X-Force URL: http://xforce.iss.net/static/6447.php Date Reported: 04/19/2001 Brief Description: Netopia Timbuktu allows unauthorized system access Risk Factor: Low Attack Type: Host Based Platforms Affected: Timbuktu Pro, Macintosh OS X Vulnerability: netopia-timbuktu-gain-access X-Force URL: http://xforce.iss.net/static/6452.php Date Reported: 04/20/2001 Brief Description: Cisco CBOS could allow attackers to gain privileged information Risk Factor: High Attack Type: Host Based / Network Based Platforms Affected: Cisco CBOS 2.4.1, Cisco CBOS 2.3.053 Vulnerability: cisco-cbos-gain-information X-Force URL: http://xforce.iss.net/static/6453.php Date Reported: 04/20/2001 Brief Description: Internet Explorer 5.x allows active scripts using XML stylesheets Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Internet Explorer 5.x, Outlook Express 5.x Vulnerability: ie-xml-stylesheets-scripting X-Force URL: http://xforce.iss.net/static/6448.php Date Reported: 04/20/2001 Brief Description: Linux gftp format string Risk Factor: Low Attack Type: Network Based Platforms Affected: gftp prior to 2.0.8, Mandrake Linux 8.0, Mandrake Linux Corporate Server 1.0.1, Immunix Linux 7.0, Red Hat Linux 7.1, Mandrake Linux 7.2, Immunix Linux 6.2, Immunix 7.0 beta, Red Hat Linux 6.2, Mandrake Linux 7.1, Red Hat Linux 7.0 Vulnerability: gftp-format-string X-Force URL: http://xforce.iss.net/static/6478.php Date Reported: 04/20/2001 Brief Description: Novell BorderManager VPN client SYN requests denial of service Risk Factor: Medium Attack Type: Host Based / Network Based Platforms Affected: Novell BorderManager 3.5 Vulnerability: bordermanager-vpn-syn-dos X-Force URL: http://xforce.iss.net/static/6429.php Date Reported: 04/20/2001 Brief Description: SAFT sendfiled could allow the execution of arbitrary code Risk Factor: Low Attack Type: Host Based Platforms Affected: Debian Linux 2.2, Progeny Linux, sendfile Vulnerability: saft-sendfiled-execute-code X-Force URL: http://xforce.iss.net/static/6430.php Date Reported: 04/21/2001 Brief Description: Mercury MTA for Novell Netware buffer overflow Risk Factor: Medium Attack Type: Network Based Platforms Affected: Mercury MTA 1.47 and earlier, Novell NetWare Vulnerability: mercury-mta-bo X-Force URL: http://xforce.iss.net/static/6444.php Date Reported: 04/21/2001 Brief Description: QNX allows attacker to read files on FAT partition Risk Factor: High Attack Type: Host Based / Network Based Platforms Affected: QNX 2.4 Vulnerability: qnx-fat-file-read X-Force URL: http://xforce.iss.net/static/6437.php Date Reported: 04/23/2001 Brief Description: Viking Server "dot dot" (\...\) directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: Viking Server 1.0.7 Vulnerability: viking-dot-directory-traversal X-Force URL: http://xforce.iss.net/static/6450.php Date Reported: 04/24/2001 Brief Description: NetCruiser Web Server could reveal directory path Risk Factor: High Attack Type: Network Based Platforms Affected: NetCruiser Web Server 0.1.2.8 Vulnerability: netcruiser-server-path-disclosure X-Force URL: http://xforce.iss.net/static/6468.php Date Reported: 04/24/2001 Brief Description: Perl Web Server directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: Perl Web Server 0.3 and prior Vulnerability: perl-webserver-directory-traversal X-Force URL: http://xforce.iss.net/static/6451.php Date Reported: 04/24/2001 Brief Description: Small HTTP Server /aux denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: Small HTTP Server 2.03 Vulnerability: small-http-aux-dos X-Force URL: http://xforce.iss.net/static/6446.php Date Reported: 04/24/2001 Brief Description: IPSwitch IMail SMTP daemon mailing list handler buffer overflow Risk Factor: Low Attack Type: Network Based Platforms Affected: IPSwitch Imail 6.06 and earlier Vulnerability: ipswitch-imail-smtp-bo X-Force URL: http://xforce.iss.net/static/6445.php Date Reported: 04/25/2001 Brief Description: MIT Kerberos 5 could allow attacker to gain root access by injecting base64-encoded data Risk Factor: Low Attack Type: Network Based Platforms Affected: MIT Kerberos 5 Vulnerability: kerberos-inject-base64-encode X-Force URL: http://xforce.iss.net/static/6454.php Date Reported: 04/26/2001 Brief Description: IRIX netprint -n allows attacker to access shared library Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: IRIX 6.x Vulnerability: irix-netprint-shared-library X-Force URL: http://xforce.iss.net/static/6473.php Date Reported: 04/26/2001 Brief Description: WebXQ "dot dot" directory traversal Risk Factor: High Attack Type: Network Based Platforms Affected: Windows, WebXQ 2.1.204 Vulnerability: webxq-dot-directory-traversal X-Force URL: http://xforce.iss.net/static/6466.php Date Reported: 04/26/2001 Brief Description: RaidenFTPD "dot dot" directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: Windows NT 4.0, Windows 2000, RaidenFTPD 2.1 Vulnerability: raidenftpd-dot-directory-traversal X-Force URL: http://xforce.iss.net/static/6455.php Date Reported: 04/27/2001 Brief Description: PerlCal CGI cal_make.pl script directory traversal Risk Factor: High Attack Type: Network Based Platforms Affected: Unix, PerlCal 2.95 and prior Vulnerability: perlcal-calmake-directory-traversal X-Force URL: http://xforce.iss.net/static/6480.php Date Reported: 04/28/2001 Brief Description: ICQ Web Front plugin denial of service Risk Factor: Medium Attack Type: Network Based Platforms Affected: ICQ Web Front, ICQ 2000b 3278 and earlier Vulnerability: icq-webfront-dos X-Force URL: http://xforce.iss.net/static/6474.php Date Reported: 04/28/2001 Brief Description: Alex FTP Server "dot dot" directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: Alex's FTP Server 0.7 Vulnerability: alex-ftp-directory-traversal X-Force URL: http://xforce.iss.net/static/6475.php Date Reported: 04/28/2001 Brief Description: BRS WebWeaver FTP path disclosure Risk Factor: High Attack Type: Network Based Platforms Affected: BRS WebWeaver 0.63 Vulnerability: webweaver-ftp-path-disclosure X-Force URL: http://xforce.iss.net/static/6477.php Date Reported: 04/28/2001 Brief Description: BRS WebWeaver Web server "dot dot" directory traversal Risk Factor: Medium Attack Type: Network Based Platforms Affected: BRS WebWeaver 0.63 Vulnerability: webweaver-web-directory-traversal X-Force URL: http://xforce.iss.net/static/6476.php Date Reported: 04/29/2001 Brief Description: Winamp AIP buffer overflow Risk Factor: Low Attack Type: Host Based / Network Based Platforms Affected: Winamp 2.6x and 2.7x Vulnerability: winamp-aip-bo X-Force URL: http://xforce.iss.net/static/6479.php Date Reported: 04/29/2001 Brief Description: BearShare "dot dot" allows remote attacker to traverse directories and download any file Risk Factor: Medium Attack Type: Network Based Platforms Affected: BearShare 2.2.2 and prior, Windows 95, Windows 98, Windows ME Vulnerability: bearshare-dot-download-files X-Force URL: http://xforce.iss.net/static/6481.php Date Reported: 05/01/2001 Brief Description: IIS 5.0 ISAPI extension buffer overflow Risk Factor: High Attack Type: Network Based Platforms Affected: IIS 5.0, Windows 2000 Server, Windows 2000 Advanced Server, Windows 2000 Datacenter Server Vulnerability: iis-isapi-bo X-Force URL: http://xforce.iss.net/static/6485.php _____ Risk Factor Key: High Any vulnerability that provides an attacker with immediate access into a machine, gains superuser access, or bypasses a firewall. Example: A vulnerable Sendmail 8.6.5 version that allows an intruder to execute commands on mail server. Medium Any vulnerability that provides information that has a high potential of giving system access to an intruder. Example: A misconfigured TFTP or vulnerable NIS server that allows an intruder to get the password file that could contain an account with a guessable password. Low Any vulnerability that provides information that potentially could lead to a compromise. Example: A finger that allows an intruder to find out who is online and potential accounts to attempt to crack passwords via brute force methods. ________ About Internet Security Systems (ISS) Internet Security Systems is a leading global provider of security management solutions for the Internet, protecting digital assets and ensuring safe and uninterrupted e-business. With its industry-leading intrusion detection and vulnerability assessment software, remote managed security services, and strategic consulting and education offerings, ISS is a trusted security provider to more than 8,000 customers worldwide including 21 of the 25 largest U.S. commercial banks and the top 10 U.S. telecommunications companies. Founded in 1994, ISS is headquartered in Atlanta, GA, with additional offices throughout North America and international operations in Asia, Australia, Europe, Latin America and the Middle East. For more information, visit the Internet Security Systems web site at www.iss.net or call 888-901-7477. Copyright (c) 2001 by Internet Security Systems, Inc. Permission is hereby granted for the redistribution of this Alert electronically. It is not to be edited in any way without express consent of the X-Force. If you wish to reprint the whole or any part of this Alert in any other medium excluding electronic medium, please e-mail xforce@iss.net for permission. Disclaimer The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. X-Force PGP Key available at: http://xforce.iss.net/sensitive.php as well as on MIT's PGP key server and PGP.com's key server. Please send suggestions, updates, and comments to: X-Force xforce@iss.net of Internet Security Systems, Inc. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: noconv iQCVAwUBOvrtmTRfJiV99eG9AQFRFwP+NhRj20kY5edBZBvSMBZKAOKEQGpJPPnD J/YCCB9TkzoWt65a7HR6c2MbimbnCo8YrhkjgFcvPmArCOFMS/68lhcStKd769PO rbojCoys8l1woaFDwzPnQeWVoNMen83sVvsiy7Bwk5Sm0cjM3gZC+X0vqG8EI59Y OAtrNiOkj7o= =kYl+ -----END PGP SIGNATURE-----

Trust: 5.13

sources: NVD: CVE-2001-0414 // CERT/CC: VU#970472 // CERT/CC: VU#676552 // CERT/CC: VU#601312 // CERT/CC: VU#310816 // JVNDB: JVNDB-2001-000046 // BID: 2540 // BID: 2565 // PACKETSTORM: 24836

AFFECTED PRODUCTS

vendor:lotusmodel: - scope: - version: -

Trust: 1.6

vendor:dave millsmodel:ntpdscope:eqversion:4.0.99f

Trust: 1.6

vendor:dave millsmodel:ntpdscope:eqversion:4.0.99d

Trust: 1.6

vendor:dave millsmodel:ntpdscope:eqversion:4.0.99b

Trust: 1.6

vendor:dave millsmodel:xntp3scope:eqversion:5.93c

Trust: 1.6

vendor:dave millsmodel:ntpdscope:eqversion:4.0.99e

Trust: 1.6

vendor:dave millsmodel:xntp3scope:eqversion:5.93e

Trust: 1.6

vendor:dave millsmodel:ntpdscope:eqversion:4.0.99a

Trust: 1.6

vendor:dave millsmodel:ntpdscope:eqversion:4.0.99

Trust: 1.6

vendor:dave millsmodel:ntpdscope:eqversion:4.0.99c

Trust: 1.6

vendor:dave millsmodel:xntp3scope:eqversion:5.93d

Trust: 1.6

vendor:dave millsmodel:ntpdscope:eqversion:4.0.99j

Trust: 1.0

vendor:dave millsmodel:ntpdscope:eqversion:4.0.99h

Trust: 1.0

vendor:dave millsmodel:xntp3scope:eqversion:5.93

Trust: 1.0

vendor:dave millsmodel:ntpdscope:eqversion:4.0.99i

Trust: 1.0

vendor:dave millsmodel:ntpdscope:lteversion:4.0.99k

Trust: 1.0

vendor:dave millsmodel:ntpdscope:eqversion:4.0.99g

Trust: 1.0

vendor:dave millsmodel:xntp3scope:eqversion:5.93b

Trust: 1.0

vendor:dave millsmodel:xntp3scope:eqversion:5.93a

Trust: 1.0

vendor:ciscomodel:ios 12.0 w5scope: - version: -

Trust: 0.9

vendor:berkeley designmodel: - scope: - version: -

Trust: 0.8

vendor:compaq computermodel: - scope: - version: -

Trust: 0.8

vendor:debian linuxmodel: - scope: - version: -

Trust: 0.8

vendor:freebsdmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:netbsdmodel: - scope: - version: -

Trust: 0.8

vendor:openbsdmodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:suse linuxmodel: - scope: - version: -

Trust: 0.8

vendor:slackwaremodel: - scope: - version: -

Trust: 0.8

vendor:sun microsystemsmodel: - scope: - version: -

Trust: 0.8

vendor:the sco group sco linuxmodel: - scope: - version: -

Trust: 0.8

vendor:the sco group sco unixmodel: - scope: - version: -

Trust: 0.8

vendor:university of delawaremodel: - scope: - version: -

Trust: 0.8

vendor:ritmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:10.01

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:10.10

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:10.20

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:10.24

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.00

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.04

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:6.2

Trust: 0.8

vendor:red hatmodel:linuxscope:eqversion:7.0

Trust: 0.8

vendor:ciscomodel:ios 12.0 xkscope: - version: -

Trust: 0.6

vendor:hpmodel:hp-uxscope:eqversion:10.01

Trust: 0.3

vendor:ciscomodel:ios 12.0xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.2(3)

Trust: 0.3

vendor:ciscomodel:ios 11.3nascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2bcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3wa4scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xpscope: - version: -

Trust: 0.3

vendor:davemodel:mills ntpd gscope:eqversion:4.0.99

Trust: 0.3

vendor:ciscomodel:ios 12.1xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 st1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.0

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:10.10

Trust: 0.3

vendor:ciscomodel:pgw2200 pstn gatewayscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3dbscope: - version: -

Trust: 0.3

vendor:davemodel:mills ntpd escope:eqversion:4.0.99

Trust: 0.3

vendor:ciscomodel:virtual switch controllerscope:eqversion:3000

Trust: 0.3

vendor:ciscomodel:ios 12.1xwscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xuscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ecscope:neversion: -

Trust: 0.3

vendor:davemodel:mills xntp3 escope:eqversion:5.93

Trust: 0.3

vendor:ciscomodel:ios 12.1 yb4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1aascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0

Trust: 0.3

vendor:ciscomodel:ios 12.1xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1xx

Trust: 0.3

vendor:ciscomodel:ios 12.1 xf4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0sscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xa1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1cxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 escope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.2

Trust: 0.3

vendor:ciscomodel:ios 12.1 aascope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 cxscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yfscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3aascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2gsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2ddscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 11.3hascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 xs2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xmscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2piscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2sscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.2(4)

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1

Trust: 0.3

vendor:sunmodel:solaris 2.6 x86scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2pbscope: - version: -

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.0.4

Trust: 0.3

vendor:ciscomodel:ios 12.1ydscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ip managerscope:eqversion:1.0

Trust: 0.3

vendor:ciscomodel:ios 12.0xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0wtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 yf2scope:neversion: -

Trust: 0.3

vendor:davemodel:mills xntp3 cscope:eqversion:5.93

Trust: 0.3

vendor:davemodel:mills ntpd hscope:eqversion:4.0.99

Trust: 0.3

vendor:ciscomodel:ios 11.3tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 wc2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:10.3

Trust: 0.3

vendor:ciscomodel:ios 12.2xdscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3mascope: - version: -

Trust: 0.3

vendor:davemodel:mills ntpd cscope:eqversion:4.0.99

Trust: 0.3

vendor:ciscomodel:ios 12.2ycscope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 8 sparcscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.1xv

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.11

Trust: 0.3

vendor:ciscomodel:ios 12.2xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 bscope:neversion: -

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0

Trust: 0.3

vendor:ciscomodel:ios 12.2xhscope: - version: -

Trust: 0.3

vendor:davemodel:mills xntp3 bscope:eqversion:5.93

Trust: 0.3

vendor:davemodel:mills ntpdscope:eqversion:4.0.99

Trust: 0.3

vendor:ciscomodel:ios 12.0xnscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 bpscope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.2

Trust: 0.3

vendor:ciscomodel:ios 12.1escope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 tscope:neversion: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.3

Trust: 0.3

vendor:ciscomodel:ios 12.0wcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1iascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xrscope: - version: -

Trust: 0.3

vendor:davemodel:mills ntpd kscope:eqversion:4.0.99

Trust: 0.3

vendor:ciscomodel:ios 12.1 yd2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2dascope: - version: -

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:2.6

Trust: 0.3

vendor:ciscomodel:ios 12.1 xm4scope:neversion: -

Trust: 0.3

vendor:davemodel:mills xntp3 dscope:eqversion:5.93

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.0.1

Trust: 0.3

vendor:ciscomodel:ios 12.0xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0tscope: - version: -

Trust: 0.3

vendor:sunmodel:solaris 8 x86scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1ctscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 sscope:neversion: -

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.0.2

Trust: 0.3

vendor:ciscomodel:ios 12.1xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 piscope:neversion: -

Trust: 0.3

vendor:davemodel:mills ntpd jscope:eqversion:4.0.99

Trust: 0.3

vendor:ciscomodel:ios 12.1dcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0 sl2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xd1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.0slscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ybscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2pscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 eyscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ycscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2sascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xpscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1ezscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xlscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bscope: - version: -

Trust: 0.3

vendor:ciscomodel:ip managerscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:ios 12.2 xhscope:neversion: -

Trust: 0.3

vendor:davemodel:mills ntpd ascope:eqversion:4.0.99

Trust: 0.3

vendor:davemodel:mills xntp3 ascope:eqversion:5.93

Trust: 0.3

vendor:ciscomodel:ios 12.2yascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xtscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2fscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 t9scope:neversion: -

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:11.0

Trust: 0.3

vendor:ciscomodel:ios 12.2 xascope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1dbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.1cascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xcscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xqscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.1

Trust: 0.3

vendor:ciscomodel:ios 12.1ecscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xhscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.1(5)xv3

Trust: 0.3

vendor:ciscomodel:ios 11.2wa4scope: - version: -

Trust: 0.3

vendor:davemodel:mills ntpd fscope:eqversion:4.0.99

Trust: 0.3

vendor:ciscomodel:ios 12.1xyscope: - version: -

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:7.0

Trust: 0.3

vendor:sunmodel:solaris 7.0 x86scope: - version: -

Trust: 0.3

vendor:ciscomodel:voice services provisioning toolscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xescope:neversion: -

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:10.24

Trust: 0.3

vendor:ciscomodel:ios 12.1xkscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.2xascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xiscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2 xqscope:neversion: -

Trust: 0.3

vendor:davemodel:mills xntp3scope:eqversion:5.93

Trust: 0.3

vendor:ciscomodel:ios 11.1ccscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1yascope: - version: -

Trust: 0.3

vendor:ciscomodel:billing and management serverscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bxscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dascope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:12.0xv

Trust: 0.3

vendor:ciscomodel:ios 12.0scscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xgscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 yc1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1exscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2xbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1eyscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xescope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dbscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xsscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:neversion:12.1(9)

Trust: 0.3

vendor:ciscomodel:ios 12.0 yb4scope:neversion: -

Trust: 0.3

vendor:davemodel:mills ntpd bscope:eqversion:4.0.99

Trust: 0.3

vendor:ciscomodel:ios 12.2xescope: - version: -

Trust: 0.3

vendor:ciscomodel:btsscope:eqversion:10200

Trust: 0.3

vendor:ciscomodel:ios 12.0xjscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0dcscope: - version: -

Trust: 0.3

vendor:ciscomodel:sc2200scope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.0xrscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.1 ez2scope:neversion: -

Trust: 0.3

vendor:hpmodel:hp-uxscope:eqversion:10.20

Trust: 0.3

vendor:ciscomodel:ios 12.0wcscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 12.1xzscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 12.2bwscope: - version: -

Trust: 0.3

vendor:davemodel:mills ntpd iscope:eqversion:4.0.99

Trust: 0.3

vendor:ciscomodel:ios 12.0stscope: - version: -

Trust: 0.3

vendor:davemodel:mills ntpd dscope:eqversion:4.0.99

Trust: 0.3

vendor:ciscomodel:ios 11.1aascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3dascope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 11.3xascope: - version: -

Trust: 0.3

vendor:lotusmodel:dominoscope:eqversion:5.0.6

Trust: 0.3

vendor:lotusmodel:dominoscope:eqversion:5.0.5

Trust: 0.3

vendor:lotusmodel:dominoscope:eqversion:5.0.4

Trust: 0.3

vendor:lotusmodel:dominoscope:eqversion:5.0.3

Trust: 0.3

vendor:lotusmodel:dominoscope:eqversion:5.0.2

Trust: 0.3

vendor:lotusmodel:dominoscope:eqversion:5.0.1

Trust: 0.3

vendor:lotusmodel:dominoscope:neversion:5.0.7

Trust: 0.3

sources: CERT/CC: VU#970472 // CERT/CC: VU#676552 // CERT/CC: VU#601312 // CERT/CC: VU#310816 // BID: 2540 // BID: 2565 // JVNDB: JVNDB-2001-000046 // CNNVD: CNNVD-200106-110 // NVD: CVE-2001-0414

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2001-0414
value: HIGH

Trust: 1.8

CARNEGIE MELLON: VU#970472
value: 79.65

Trust: 0.8

CARNEGIE MELLON: VU#676552
value: 10.50

Trust: 0.8

CARNEGIE MELLON: VU#601312
value: 9.98

Trust: 0.8

CARNEGIE MELLON: VU#310816
value: 1.62

Trust: 0.8

CNNVD: CNNVD-200106-110
value: CRITICAL

Trust: 0.6

NVD:
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: FALSE
obtainAllPrivilege: TRUE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

NVD: CVE-2001-0414
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: CERT/CC: VU#970472 // CERT/CC: VU#676552 // CERT/CC: VU#601312 // CERT/CC: VU#310816 // JVNDB: JVNDB-2001-000046 // CNNVD: CNNVD-200106-110 // NVD: CVE-2001-0414

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2001-0414

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 24836 // CNNVD: CNNVD-200106-110

TYPE

Boundary Condition Error

Trust: 0.9

sources: BID: 2540 // CNNVD: CNNVD-200106-110

CONFIGURATIONS

sources: NVD: CVE-2001-0414

PATCH

title:HPSBUX0104-148url:http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=hpsbux0104-148

Trust: 0.8

title:HPSBUX0104-148url:http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux0104-148.html

Trust: 0.8

title:RHSA-2001:045url:http://rhn.redhat.com/errata/rhsa-2001-045.html

Trust: 0.8

title:Top Pageurl:http://jp.sun.com/

Trust: 0.8

title:RHSA-2001:045url:http://www.jp.redhat.com/support/errata/rhsa/rhsa-2001-045j.html

Trust: 0.8

sources: JVNDB: JVNDB-2001-000046

EXTERNAL IDS

db:BIDid:2540

Trust: 3.5

db:NVDid:CVE-2001-0414

Trust: 2.7

db:CERT/CCid:VU#970472

Trust: 1.6

db:OSVDBid:805

Trust: 1.6

db:BIDid:2565

Trust: 1.1

db:XFid:6349

Trust: 0.9

db:XFid:6347

Trust: 0.9

db:XFid:6423

Trust: 0.9

db:BIDid:2571

Trust: 0.8

db:CERT/CCid:VU#676552

Trust: 0.8

db:CERT/CCid:VU#601312

Trust: 0.8

db:BIDid:2636

Trust: 0.8

db:CERT/CCid:VU#310816

Trust: 0.8

db:JVNDBid:JVNDB-2001-000046

Trust: 0.8

db:XFid:6321

Trust: 0.7

db:BUGTRAQid:20010418 IBM MSS OUTSIDE ADVISORY REDISTRIBUTION: IBM AIX: BUFFER OVERFLOW VULNERABILITY IN (X)NTP

Trust: 0.6

db:BUGTRAQid:20010404 NTPD =< 4.0.99K REMOTE BUFFER OVERFLOW

Trust: 0.6

db:BUGTRAQid:20010406 IMMUNIX OS SECURITY UPDATE FOR NTP AND XNTP3

Trust: 0.6

db:BUGTRAQid:20010409 [ESA-20010409-01] XNTP BUFFER OVERFLOW

Trust: 0.6

db:BUGTRAQid:20010413 PROGENY-SA-2001-02A: [UPDATE] NTPD REMOTE BUFFER OVERFLOW

Trust: 0.6

db:BUGTRAQid:20010405 RE: NTPD =< 4.0.99K REMOTE BUFFER OVERFLOW]

Trust: 0.6

db:BUGTRAQid:20010409 NTP-4.99K23.TAR.GZ IS AVAILABLE

Trust: 0.6

db:BUGTRAQid:20010408 [SLACKWARE-SECURITY] BUFFER OVERFLOW FIX FOR NTP

Trust: 0.6

db:BUGTRAQid:20010409 PROGENY-SA-2001-02: NTPD REMOTE BUFFER OVERFLOW

Trust: 0.6

db:BUGTRAQid:20010409 NTPD - NEW DEBIAN 2.2 (POTATO) VERSION IS ALSO VULNERABLE

Trust: 0.6

db:REDHATid:RHSA-2001:045

Trust: 0.6

db:MANDRAKEid:MDKSA-2001:036

Trust: 0.6

db:NETBSDid:NETBSD-SA2001-004

Trust: 0.6

db:DEBIANid:DSA-045

Trust: 0.6

db:SUSEid:SUSE-SA:2001:10

Trust: 0.6

db:CONECTIVAid:CLA-2001:392

Trust: 0.6

db:FREEBSDid:FREEBSD-SA-01:31

Trust: 0.6

db:OVALid:OVAL:ORG.MITRE.OVAL:DEF:3831

Trust: 0.6

db:CALDERAid:CSSA-2001-013

Trust: 0.6

db:SCOid:SSE073

Trust: 0.6

db:SCOid:SSE074

Trust: 0.6

db:CNNVDid:CNNVD-200106-110

Trust: 0.6

db:XFid:6382

Trust: 0.1

db:XFid:6475

Trust: 0.1

db:XFid:6343

Trust: 0.1

db:XFid:6386

Trust: 0.1

db:XFid:6328

Trust: 0.1

db:XFid:6333

Trust: 0.1

db:XFid:6334

Trust: 0.1

db:XFid:6376

Trust: 0.1

db:XFid:6345

Trust: 0.1

db:XFid:6422

Trust: 0.1

db:XFid:6322

Trust: 0.1

db:XFid:6378

Trust: 0.1

db:XFid:6342

Trust: 0.1

db:XFid:6453

Trust: 0.1

db:XFid:6405

Trust: 0.1

db:XFid:6377

Trust: 0.1

db:XFid:6428

Trust: 0.1

db:XFid:6450

Trust: 0.1

db:XFid:6332

Trust: 0.1

db:XFid:6410

Trust: 0.1

db:XFid:6478

Trust: 0.1

db:XFid:6359

Trust: 0.1

db:XFid:6485

Trust: 0.1

db:XFid:6414

Trust: 0.1

db:XFid:6371

Trust: 0.1

db:XFid:6477

Trust: 0.1

db:XFid:6395

Trust: 0.1

db:XFid:6394

Trust: 0.1

db:XFid:6353

Trust: 0.1

db:XFid:6466

Trust: 0.1

db:XFid:6481

Trust: 0.1

db:XFid:6329

Trust: 0.1

db:XFid:6372

Trust: 0.1

db:XFid:6348

Trust: 0.1

db:XFid:6437

Trust: 0.1

db:XFid:6367

Trust: 0.1

db:XFid:6411

Trust: 0.1

db:XFid:6452

Trust: 0.1

db:XFid:6354

Trust: 0.1

db:XFid:6344

Trust: 0.1

db:XFid:6356

Trust: 0.1

db:XFid:6420

Trust: 0.1

db:XFid:6424

Trust: 0.1

db:XFid:6365

Trust: 0.1

db:XFid:6415

Trust: 0.1

db:XFid:6416

Trust: 0.1

db:XFid:6412

Trust: 0.1

db:XFid:6391

Trust: 0.1

db:XFid:6447

Trust: 0.1

db:XFid:6362

Trust: 0.1

db:XFid:6408

Trust: 0.1

db:XFid:6331

Trust: 0.1

db:XFid:6431

Trust: 0.1

db:XFid:6479

Trust: 0.1

db:XFid:6429

Trust: 0.1

db:XFid:6392

Trust: 0.1

db:XFid:6396

Trust: 0.1

db:XFid:6480

Trust: 0.1

db:XFid:6351

Trust: 0.1

db:XFid:6468

Trust: 0.1

db:XFid:6366

Trust: 0.1

db:XFid:6327

Trust: 0.1

db:XFid:6474

Trust: 0.1

db:XFid:6319

Trust: 0.1

db:XFid:6403

Trust: 0.1

db:XFid:6413

Trust: 0.1

db:XFid:6388

Trust: 0.1

db:XFid:6363

Trust: 0.1

db:XFid:6454

Trust: 0.1

db:XFid:6364

Trust: 0.1

db:XFid:6400

Trust: 0.1

db:XFid:6339

Trust: 0.1

db:XFid:6455

Trust: 0.1

db:XFid:6341

Trust: 0.1

db:XFid:6318

Trust: 0.1

db:XFid:6436

Trust: 0.1

db:XFid:6448

Trust: 0.1

db:XFid:6320

Trust: 0.1

db:XFid:6385

Trust: 0.1

db:XFid:6379

Trust: 0.1

db:XFid:6402

Trust: 0.1

db:XFid:6426

Trust: 0.1

db:XFid:6323

Trust: 0.1

db:XFid:6369

Trust: 0.1

db:XFid:6336

Trust: 0.1

db:XFid:6427

Trust: 0.1

db:XFid:6446

Trust: 0.1

db:XFid:6368

Trust: 0.1

db:XFid:6389

Trust: 0.1

db:XFid:6357

Trust: 0.1

db:XFid:6476

Trust: 0.1

db:XFid:6401

Trust: 0.1

db:XFid:6326

Trust: 0.1

db:XFid:6340

Trust: 0.1

db:XFid:6337

Trust: 0.1

db:XFid:6473

Trust: 0.1

db:XFid:6375

Trust: 0.1

db:XFid:6409

Trust: 0.1

db:XFid:6390

Trust: 0.1

db:XFid:6335

Trust: 0.1

db:XFid:6393

Trust: 0.1

db:XFid:6350

Trust: 0.1

db:XFid:6324

Trust: 0.1

db:XFid:6445

Trust: 0.1

db:XFid:6404

Trust: 0.1

db:XFid:6360

Trust: 0.1

db:XFid:6398

Trust: 0.1

db:XFid:6430

Trust: 0.1

db:XFid:6406

Trust: 0.1

db:XFid:6444

Trust: 0.1

db:XFid:6330

Trust: 0.1

db:XFid:6355

Trust: 0.1

db:XFid:6407

Trust: 0.1

db:XFid:6374

Trust: 0.1

db:XFid:6383

Trust: 0.1

db:XFid:6451

Trust: 0.1

db:PACKETSTORMid:24836

Trust: 0.1

sources: CERT/CC: VU#970472 // CERT/CC: VU#676552 // CERT/CC: VU#601312 // CERT/CC: VU#310816 // BID: 2540 // BID: 2565 // JVNDB: JVNDB-2001-000046 // PACKETSTORM: 24836 // CNNVD: CNNVD-200106-110 // NVD: CVE-2001-0414

REFERENCES

url:http://www.securityfocus.com/bid/2540

Trust: 3.2

url:ftp://ftp.netbsd.org/pub/netbsd/misc/security/advisories/netbsd-sa2001-004.txt.asc

Trust: 2.4

url:http://www.securityfocus.com/advisories/3208

Trust: 1.6

url:http://www.linux-mandrake.com/en/security/2001/mdksa-2001-036.php3

Trust: 1.6

url:http://www.redhat.com/support/errata/rhsa-2001-045.html

Trust: 1.6

url:http://www.osvdb.org/805

Trust: 1.6

url:http://www.calderasystems.com/support/security/advisories/cssa-2001-013.0.txt

Trust: 1.6

url:http://lists.suse.com/archives/suse-security-announce/2001-apr/0000.html

Trust: 1.6

url:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000392

Trust: 1.6

url:http://archives.neohapsis.com/archives/bugtraq/2001-04/0314.html

Trust: 1.6

url:http://archives.neohapsis.com/archives/bugtraq/2001-04/0225.html

Trust: 1.6

url:http://archives.neohapsis.com/archives/bugtraq/2001-04/0127.html

Trust: 1.6

url:ftp://ftp.sco.com/sse/sse074.ltr

Trust: 1.6

url:ftp://ftp.sco.com/sse/sse073.ltr

Trust: 1.6

url:ftp://ftp.freebsd.org/pub/freebsd/cert/advisories/freebsd-sa-01:31.ntpd.asc

Trust: 1.6

url:http://marc.info/?l=bugtraq&m=98642418618512&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=98654963328381&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=98659782815613&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=98679815917014&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=98683952401753&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=98684202610470&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=98684532921941&w=2

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/6321

Trust: 1.0

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a3831

Trust: 1.0

url:https://www.debian.org/security/2001/dsa-045

Trust: 1.0

url:http://xforce.iss.net/static/6349.php

Trust: 0.9

url:http://xforce.iss.net/static/6347.php

Trust: 0.9

url:http://xforce.iss.net/static/6423.php

Trust: 0.9

url:http://www.freebsd.org/cgi/cvsweb.cgi/src/contrib/ntp/ntpd/ntp_control.c?r1+=1.1&r2=1.2

Trust: 0.8

url:http://www.freebsd.org/cgi/cvsweb.cgi/ports/net/ntp/files/patch-ntp_control.c (patch for ntp-4.0.99k)

Trust: 0.8

url:http://www.faqs.org/rfcs/rfc1305.html

Trust: 0.8

url:http://www.ntp.org/

Trust: 0.8

url:http://sunsolve.sun.com/pub-cgi/retrieve.pl?type=0&doc=secbull%2f211&display=plain

Trust: 0.8

url:http://www.securityfocus.com/bid/2571

Trust: 0.8

url:http://www.securityfocus.com/bid/2565

Trust: 0.8

url:http://www.notes.net/r5fixlist.nsf/a8f0ffda1fc76c8985256752006aba6c?openview&start=3.111&count=30&expand=3.126#3.126

Trust: 0.8

url:http://www.securityfocus.com/bid/2636

Trust: 0.8

url:http://www.ritlabs.com/the_bat/index.html

Trust: 0.8

url:http://www.security.nnov.ru/search/news.asp?binid=1136

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2001-0414

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2001-0414

Trust: 0.8

url:http://www.kb.cert.org/vuls/id/970472

Trust: 0.8

url:http://xforce.iss.net/static/6321.php

Trust: 0.7

url:http://marc.theaimsgroup.com/?l=bugtraq&m=98651866104663&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=98684532921941&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=98684202610470&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=98683952401753&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=98679815917014&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=98659782815613&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=98654963328381&w=2

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=98642418618512&w=2

Trust: 0.6

url:http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:3831

Trust: 0.6

url:http://www.cisco.com/warp/public/707/ntp-pub.shtml

Trust: 0.3

url:http://www.ntp.org

Trust: 0.3

url:http://support.coresecurity.com/impact/exploits/1d0617f506101c3c4db122dc40236f69.html

Trust: 0.3

url:http://www.lotus.com/home.nsf/welcome/domino

Trust: 0.3

url:http://xforce.iss.net/static/6323.php

Trust: 0.1

url:http://xforce.iss.net/static/6330.php

Trust: 0.1

url:http://xforce.iss.net/static/6392.php

Trust: 0.1

url:http://xforce.iss.net/static/6444.php

Trust: 0.1

url:http://xforce.iss.net/static/6455.php

Trust: 0.1

url:http://xforce.iss.net/static/6468.php

Trust: 0.1

url:http://xforce.iss.net/static/6452.php

Trust: 0.1

url:http://xforce.iss.net/static/6327.php

Trust: 0.1

url:http://xforce.iss.net/static/6395.php

Trust: 0.1

url:http://xforce.iss.net/static/6485.php

Trust: 0.1

url:http://xforce.iss.net/static/6402.php

Trust: 0.1

url:http://xforce.iss.net/static/6362.php

Trust: 0.1

url:http://xforce.iss.net/static/6366.php

Trust: 0.1

url:http://xforce.iss.net/static/6336.php

Trust: 0.1

url:http://xforce.iss.net/static/6451.php

Trust: 0.1

url:http://xforce.iss.net/static/6334.php

Trust: 0.1

url:http://xforce.iss.net/static/6406.php

Trust: 0.1

url:http://xforce.iss.net/static/6427.php

Trust: 0.1

url:https://www.iss.net

Trust: 0.1

url:http://xforce.iss.net/static/6351.php

Trust: 0.1

url:http://xforce.iss.net/static/6343.php

Trust: 0.1

url:http://xforce.iss.net/static/6326.php

Trust: 0.1

url:http://xforce.iss.net/static/6319.php

Trust: 0.1

url:http://xforce.iss.net/static/6344.php

Trust: 0.1

url:http://xforce.iss.net/static/6398.php

Trust: 0.1

url:http://xforce.iss.net/static/6428.php

Trust: 0.1

url:http://xforce.iss.net/static/6353.php

Trust: 0.1

url:http://xforce.iss.net/static/6356.php

Trust: 0.1

url:http://xforce.iss.net/static/6390.php

Trust: 0.1

url:http://xforce.iss.net/static/6450.php

Trust: 0.1

url:http://xforce.iss.net/static/6446.php

Trust: 0.1

url:http://xforce.iss.net/static/6368.php

Trust: 0.1

url:http://xforce.iss.net/static/6332.php

Trust: 0.1

url:http://xforce.iss.net/static/6359.php

Trust: 0.1

url:http://xforce.iss.net/static/6376.php

Trust: 0.1

url:http://xforce.iss.net/static/6354.php

Trust: 0.1

url:http://xforce.iss.net/static/6378.php

Trust: 0.1

url:http://xforce.iss.net/static/6374.php

Trust: 0.1

url:http://xforce.iss.net/static/6394.php

Trust: 0.1

url:http://xforce.iss.net/static/6383.php

Trust: 0.1

url:http://xforce.iss.net/static/6411.php

Trust: 0.1

url:http://xforce.iss.net/static/6414.php

Trust: 0.1

url:http://xforce.iss.net/static/6481.php

Trust: 0.1

url:http://xforce.iss.net/static/6365.php

Trust: 0.1

url:http://xforce.iss.net/static/6382.php

Trust: 0.1

url:http://xforce.iss.net/static/6403.php

Trust: 0.1

url:http://xforce.iss.net/static/6324.php

Trust: 0.1

url:http://xforce.iss.net/static/6329.php

Trust: 0.1

url:http://xforce.iss.net/static/6437.php

Trust: 0.1

url:http://xforce.iss.net/static/6388.php

Trust: 0.1

url:http://xforce.iss.net/static/6415.php

Trust: 0.1

url:http://xforce.iss.net/static/6424.php

Trust: 0.1

url:http://xforce.iss.net/static/6342.php

Trust: 0.1

url:http://xforce.iss.net/static/6337.php

Trust: 0.1

url:http://xforce.iss.net/static/6357.php

Trust: 0.1

url:http://xforce.iss.net/static/6348.php

Trust: 0.1

url:http://xforce.iss.net/alerts/vol-6_num-6.php

Trust: 0.1

url:http://xforce.iss.net/static/6407.php

Trust: 0.1

url:http://xforce.iss.net/static/6379.php

Trust: 0.1

url:http://xforce.iss.net/static/6389.php

Trust: 0.1

url:http://xforce.iss.net/static/6436.php

Trust: 0.1

url:http://xforce.iss.net/static/6466.php

Trust: 0.1

url:http://xforce.iss.net/static/6412.php

Trust: 0.1

url:http://xforce.iss.net/static/6448.php

Trust: 0.1

url:http://xforce.iss.net/static/6400.php

Trust: 0.1

url:http://xforce.iss.net/static/6318.php

Trust: 0.1

url:http://xforce.iss.net/static/6478.php

Trust: 0.1

url:http://xforce.iss.net/static/6454.php

Trust: 0.1

url:http://xforce.iss.net/static/6372.php

Trust: 0.1

url:http://xforce.iss.net/

Trust: 0.1

url:http://xforce.iss.net/static/6420.php

Trust: 0.1

url:http://xforce.iss.net/static/6335.php

Trust: 0.1

url:http://xforce.iss.net/static/6345.php

Trust: 0.1

url:http://xforce.iss.net/static/6479.php

Trust: 0.1

url:http://xforce.iss.net/static/6355.php

Trust: 0.1

url:http://xforce.iss.net/static/6364.php

Trust: 0.1

url:http://xforce.iss.net/static/6476.php

Trust: 0.1

url:http://xforce.iss.net/static/6393.php

Trust: 0.1

url:http://xforce.iss.net/static/6391.php

Trust: 0.1

url:http://xforce.iss.net/static/6341.php

Trust: 0.1

url:http://xforce.iss.net/static/6371.php

Trust: 0.1

url:http://xforce.iss.net/static/6429.php

Trust: 0.1

url:http://xforce.iss.net/static/6369.php

Trust: 0.1

url:http://xforce.iss.net/static/6405.php

Trust: 0.1

url:http://xforce.iss.net/static/6431.php

Trust: 0.1

url:http://xforce.iss.net/static/6422.php

Trust: 0.1

url:http://xforce.iss.net/static/6410.php

Trust: 0.1

url:http://xforce.iss.net/static/6360.php

Trust: 0.1

url:http://xforce.iss.net/static/6401.php

Trust: 0.1

url:http://xforce.iss.net/static/6413.php

Trust: 0.1

url:http://xforce.iss.net/static/6474.php

Trust: 0.1

url:http://xforce.iss.net/static/6477.php

Trust: 0.1

url:http://xforce.iss.net/static/6385.php

Trust: 0.1

url:http://xforce.iss.net/static/6473.php

Trust: 0.1

url:http://xforce.iss.net/static/6328.php

Trust: 0.1

url:http://xforce.iss.net/static/6377.php

Trust: 0.1

url:http://xforce.iss.net/static/6416.php

Trust: 0.1

url:http://xforce.iss.net/static/6339.php

Trust: 0.1

url:http://xforce.iss.net/static/6367.php

Trust: 0.1

url:http://xforce.iss.net/static/6445.php

Trust: 0.1

url:http://xforce.iss.net/static/6453.php

Trust: 0.1

url:http://xforce.iss.net/static/6375.php

Trust: 0.1

url:http://xforce.iss.net/maillists/index.php

Trust: 0.1

url:http://xforce.iss.net/static/6475.php

Trust: 0.1

url:http://xforce.iss.net/static/6430.php

Trust: 0.1

url:http://xforce.iss.net/static/6340.php

Trust: 0.1

url:http://xforce.iss.net/static/6396.php

Trust: 0.1

url:http://xforce.iss.net/static/6426.php

Trust: 0.1

url:http://xforce.iss.net/static/6331.php

Trust: 0.1

url:http://xforce.iss.net/static/6386.php

Trust: 0.1

url:http://xforce.iss.net/sensitive.php

Trust: 0.1

url:http://xforce.iss.net/static/6350.php

Trust: 0.1

url:http://xforce.iss.net/static/6333.php

Trust: 0.1

url:http://xforce.iss.net/static/6480.php

Trust: 0.1

url:http://xforce.iss.net/static/6409.php

Trust: 0.1

url:http://xforce.iss.net/static/6447.php

Trust: 0.1

url:http://xforce.iss.net/static/6404.php

Trust: 0.1

url:http://xforce.iss.net/static/6320.php

Trust: 0.1

url:http://xforce.iss.net/static/6408.php

Trust: 0.1

url:http://xforce.iss.net/static/6322.php

Trust: 0.1

url:http://xforce.iss.net/static/6363.php

Trust: 0.1

sources: CERT/CC: VU#970472 // CERT/CC: VU#676552 // CERT/CC: VU#601312 // CERT/CC: VU#310816 // BID: 2540 // BID: 2565 // JVNDB: JVNDB-2001-000046 // PACKETSTORM: 24836 // CNNVD: CNNVD-200106-110 // NVD: CVE-2001-0414

CREDITS

Przemyslaw Frasunekā€» venglin@freebsd.lublin.pl

Trust: 0.6

sources: CNNVD: CNNVD-200106-110

SOURCES

db:CERT/CCid:VU#970472
db:CERT/CCid:VU#676552
db:CERT/CCid:VU#601312
db:CERT/CCid:VU#310816
db:BIDid:2540
db:BIDid:2565
db:JVNDBid:JVNDB-2001-000046
db:PACKETSTORMid:24836
db:CNNVDid:CNNVD-200106-110
db:NVDid:CVE-2001-0414

LAST UPDATE DATE

2024-07-30T19:36:24.428000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#970472date:2008-05-22T00:00:00
db:CERT/CCid:VU#676552date:2001-07-26T00:00:00
db:CERT/CCid:VU#601312date:2001-07-17T00:00:00
db:CERT/CCid:VU#310816date:2001-08-30T00:00:00
db:BIDid:2540date:2007-11-05T17:05:00
db:BIDid:2565date:2001-04-11T00:00:00
db:JVNDBid:JVNDB-2001-000046date:2007-04-01T00:00:00
db:CNNVDid:CNNVD-200106-110date:2005-05-02T00:00:00
db:NVDid:CVE-2001-0414date:2017-10-10T01:29:43.233

SOURCES RELEASE DATE

db:CERT/CCid:VU#970472date:2001-04-05T00:00:00
db:CERT/CCid:VU#676552date:2001-07-23T00:00:00
db:CERT/CCid:VU#601312date:2001-07-12T00:00:00
db:CERT/CCid:VU#310816date:2001-06-01T00:00:00
db:BIDid:2540date:2001-04-04T00:00:00
db:BIDid:2565date:2001-04-11T00:00:00
db:JVNDBid:JVNDB-2001-000046date:2007-04-01T00:00:00
db:PACKETSTORMid:24836date:2001-05-16T01:07:09
db:CNNVDid:CNNVD-200106-110date:2001-04-04T00:00:00
db:NVDid:CVE-2001-0414date:2001-06-18T04:00:00