Executive Summary

Informations
Name CVE-2001-0779 First vendor Publication 2001-10-18
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0779

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:102
 
Oval ID: oval:org.mitre.oval:def:102
Title: Solaris 7 rpc.yppasswdd Buffer Overrun Vulnerability
Description: Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username.
Family: unix Class: vulnerability
Reference(s): CVE-2001-0779
Version: 1
Platform(s): Sun Solaris 7
Product(s): rpc.yppasswdd
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:56
 
Oval ID: oval:org.mitre.oval:def:56
Title: Solaris 8 rpc.yppasswdd Buffer Overrun Vulnerability
Description: Buffer overflow in rpc.yppasswdd (yppasswd server) in Solaris 2.6, 7 and 8 allows remote attackers to gain root access via a long username.
Family: unix Class: vulnerability
Reference(s): CVE-2001-0779
Version: 1
Platform(s): Sun Solaris 8
Product(s): rpc.yppasswdd
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 2
Os 4

OpenVAS Exploits

Date Description
2008-10-24 Name : yppasswdd overflow
File : nvt/yppasswdd.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
567 Solaris rpc.yppasswdd username Remote Overflow

This host is running the 'yppasswd' RPC service. This service handles password change requests and updates the NIS password file. This service contains a buffer overflow that allows an attacker to execute arbitrary code on this host. An attacker can use this to gain access to this host.

Snort® IPS/IDS

Date Description
2014-01-10 yppasswd user update TCP
RuleID : 2032-community - Revision : 11 - Type : PROTOCOL-RPC
2014-01-10 yppasswd user update TCP
RuleID : 2032 - Revision : 11 - Type : PROTOCOL-RPC
2014-01-10 yppasswd user update UDP
RuleID : 2031-community - Revision : 14 - Type : PROTOCOL-RPC
2014-01-10 yppasswd user update UDP
RuleID : 2031 - Revision : 14 - Type : PROTOCOL-RPC
2014-01-10 yppasswd new password overflow attempt TCP
RuleID : 2030-community - Revision : 12 - Type : PROTOCOL-RPC
2014-01-10 yppasswd new password overflow attempt TCP
RuleID : 2030 - Revision : 12 - Type : PROTOCOL-RPC
2014-01-10 yppasswd new password overflow attempt UDP
RuleID : 2029-community - Revision : 13 - Type : PROTOCOL-RPC
2014-01-10 yppasswd new password overflow attempt UDP
RuleID : 2029 - Revision : 13 - Type : PROTOCOL-RPC
2014-01-10 yppasswd old password overflow attempt TCP
RuleID : 2028-community - Revision : 11 - Type : PROTOCOL-RPC
2014-01-10 yppasswd old password overflow attempt TCP
RuleID : 2028 - Revision : 11 - Type : PROTOCOL-RPC
2014-01-10 yppasswd old password overflow attempt UDP
RuleID : 2027-community - Revision : 13 - Type : PROTOCOL-RPC
2014-01-10 yppasswd old password overflow attempt UDP
RuleID : 2027 - Revision : 13 - Type : PROTOCOL-RPC
2014-01-10 yppasswd username overflow attempt TCP
RuleID : 2026-community - Revision : 15 - Type : PROTOCOL-RPC
2014-01-10 yppasswd username overflow attempt TCP
RuleID : 2026 - Revision : 15 - Type : PROTOCOL-RPC
2014-01-10 yppasswd username overflow attempt UDP
RuleID : 2025-community - Revision : 17 - Type : PROTOCOL-RPC
2014-01-10 yppasswd username overflow attempt UDP
RuleID : 2025 - Revision : 17 - Type : PROTOCOL-RPC
2014-01-10 portmap request yppasswdd
RuleID : 1297 - Revision : 10 - Type : RPC
2014-01-10 portmap request yppasswdd
RuleID : 1296 - Revision : 7 - Type : RPC

Nessus® Vulnerability Scanner

Date Description
2001-05-29 Name : The remote RPC service has a remote root vulnerability.
File : yppasswdd.nasl - Type : ACT_MIXED_ATTACK

Sources (Detail)

http://www.securityfocus.com/archive/1/200110041632.JAA28125%40dim.ucsd.edu
Source Url
BID http://www.securityfocus.com/bid/2763
BUGTRAQ http://www.securityfocus.com/archive/1/187086
CERT-VN http://www.kb.cert.org/vuls/id/327281
CIAC http://www.ciac.org/ciac/bulletins/m-008.shtml
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SUN http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/209
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/6629

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Date Informations
2024-02-02 01:01:44
  • Multiple Updates
2024-02-01 12:01:17
  • Multiple Updates
2023-11-07 21:48:12
  • Multiple Updates
2023-09-05 12:01:40
  • Multiple Updates
2023-09-05 01:01:08
  • Multiple Updates
2023-09-02 12:01:41
  • Multiple Updates
2023-09-02 01:01:08
  • Multiple Updates
2023-08-12 12:02:02
  • Multiple Updates
2023-08-12 01:01:09
  • Multiple Updates
2023-08-11 12:01:45
  • Multiple Updates
2023-08-11 01:01:09
  • Multiple Updates
2023-08-06 12:01:36
  • Multiple Updates
2023-08-06 01:01:09
  • Multiple Updates
2023-08-04 12:01:40
  • Multiple Updates
2023-08-04 01:01:09
  • Multiple Updates
2023-07-14 12:01:38
  • Multiple Updates
2023-07-14 01:01:10
  • Multiple Updates
2023-03-29 01:01:36
  • Multiple Updates
2023-03-28 12:01:15
  • Multiple Updates
2022-10-11 12:01:28
  • Multiple Updates
2022-10-11 01:01:02
  • Multiple Updates
2021-05-04 12:01:26
  • Multiple Updates
2021-04-22 01:01:35
  • Multiple Updates
2020-05-23 00:14:42
  • Multiple Updates
2018-10-31 00:19:40
  • Multiple Updates
2018-05-03 09:19:24
  • Multiple Updates
2016-06-28 14:56:40
  • Multiple Updates
2016-04-26 11:56:19
  • Multiple Updates
2014-02-17 10:23:57
  • Multiple Updates
2014-01-19 21:21:29
  • Multiple Updates
2013-05-11 12:05:20
  • Multiple Updates