Unrated severityNVD Advisory· Published Dec 12, 2001· Updated Apr 16, 2026
CVE-2001-0797
CVE-2001-0797
Description
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Affected products
43cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*+ 7 more
- cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:sco:openserver:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:sco:openserver:5.0.3:*:*:*:*:*:*:*
- cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:o:sco:openserver:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:o:sco:openserver:5.0.6a:*:*:*:*:*:*:*
cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*+ 6 more
- cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- www.cert.org/advisories/CA-2001-34.htmlnvdPatchThird Party AdvisoryUS Government Resource
- xforce.iss.net/alerts/advise105.phpnvdPatchVendor Advisory
- www.securityfocus.com/bid/3681nvdExploitPatchVendor Advisory
- www.securityfocus.com/archive/1/246487nvdVendor Advisory
- www.kb.cert.org/vuls/id/569272nvdUS Government Resource
- patches.sgi.com/support/free/security/advisories/20011201-01-Invd
- stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.40/CSSA-2001-SCO.40.txtnvd
- marc.infonvd
- sunsolve.sun.com/pub-cgi/retrieve.plnvd
- www-1.ibm.com/support/search.wssnvd
- exchange.xforce.ibmcloud.com/vulnerabilities/7284nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2025nvd
News mentions
0No linked articles in our index yet.