CVE-2001-1374 : Detail

CVE-2001-1374

0.04%V3
Local
2003-04-02
03h00 +00:00
2003-03-17
23h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

expect before 5.32 searches for its libraries in /var/tmp before other directories, which could allow local users to gain root privileges via a Trojan horse library that is accessed by mkpasswd.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Don_libes>>Expect >> Version 0

    Don_libes>>Expect >> Version 1

      Don_libes>>Expect >> Version 2

        Don_libes>>Expect >> Version 3

          Don_libes>>Expect >> Version 4

            Don_libes>>Expect >> Version 5.0

              Don_libes>>Expect >> Version 5.1

                Don_libes>>Expect >> Version 5.2

                  Don_libes>>Expect >> Version 5.3

                    Don_libes>>Expect >> Version 5.4

                      Don_libes>>Expect >> Version 5.5

                        Don_libes>>Expect >> Version 5.6

                          Don_libes>>Expect >> Version 5.7

                            Don_libes>>Expect >> Version 5.8

                              Don_libes>>Expect >> Version 5.9

                                Don_libes>>Expect >> Version 5.10

                                  Don_libes>>Expect >> Version 5.11

                                    Don_libes>>Expect >> Version 5.12

                                      Don_libes>>Expect >> Version 5.13

                                        Don_libes>>Expect >> Version 5.14

                                          Don_libes>>Expect >> Version 5.15

                                            Don_libes>>Expect >> Version 5.16

                                              Don_libes>>Expect >> Version 5.17

                                                Don_libes>>Expect >> Version 5.18

                                                  Don_libes>>Expect >> Version 5.19

                                                    Don_libes>>Expect >> Version 5.20

                                                      Don_libes>>Expect >> Version 5.21

                                                        Don_libes>>Expect >> Version 5.22

                                                          Don_libes>>Expect >> Version 5.23

                                                            Don_libes>>Expect >> Version 5.24

                                                              Don_libes>>Expect >> Version 5.25

                                                                Don_libes>>Expect >> Version 5.26

                                                                  Don_libes>>Expect >> Version 5.27

                                                                    Don_libes>>Expect >> Version 5.28

                                                                      Don_libes>>Expect >> Version 5.29

                                                                        Don_libes>>Expect >> Version 5.30

                                                                          Don_libes>>Expect >> Version 5.31

                                                                            Conectiva>>Linux >> Version 6.0

                                                                            Conectiva>>Linux >> Version 7.0

                                                                            Configuraton 0

                                                                            Redhat>>Linux >> Version 7.0

                                                                            References

                                                                            http://www.securityfocus.com/bid/3074
                                                                            Tags : vdb-entry, x_refsource_BID
                                                                            http://www.redhat.com/support/errata/RHSA-2002-148.html
                                                                            Tags : vendor-advisory, x_refsource_REDHAT
                                                                            http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000409
                                                                            Tags : vendor-advisory, x_refsource_CONECTIVA