Vulnerability Details : CVE-2001-0458
Multiple buffer overflows in ePerl before 2.2.14-0.7 allow local and remote attackers to execute arbitrary commands.
Exploit prediction scoring system (EPSS) score for CVE-2001-0458
Probability of exploitation activity in the next 30 days: 0.73%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 78 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2001-0458
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2001-0458
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/6198
-
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-027.php3
Patch;Vendor Advisory
-
http://www.debian.org/security/2001/dsa-034
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/2464
Patch;Vendor Advisory
-
http://www.novell.com/linux/security/advisories/2001_008_eperl.html
Products affected by CVE-2001-0458
- cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:ralf_s._engelschall:eperl:2.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:ralf_s._engelschall:eperl:2.2.13:*:*:*:*:*:*:*