CVE-2001-0797
EXPLOITEDSGI Irix - Buffer Overflow
Title source: ruleDescription
Buffer overflow in login in various System V based operating systems allows remote attackers to execute arbitrary commands via a large number of arguments through services such as telnet and rlogin.
Exploits (11)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/16928
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotesolaris
https://www.exploit-db.com/exploits/16327
exploitdb
WORKING POC
VERIFIED
by Marco Ivaldi · cremotesolaris
https://www.exploit-db.com/exploits/716
exploitdb
WORKING POC
VERIFIED
by snooq · perlremotesolaris
https://www.exploit-db.com/exploits/21179
exploitdb
WORKING POC
VERIFIED
by Jonathan S. · textremotesolaris
https://www.exploit-db.com/exploits/57
exploitdb
WORKING POC
VERIFIED
by I)ruid · rubyremotesolaris
https://www.exploit-db.com/exploits/10036
metasploit
WORKING POC
EXCELLENT
by MC, cazz · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/solaris/telnet/ttyprompt.rb
metasploit
WORKING POC
GOOD
by I)ruid · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/solaris/dialup/manyargs.rb
Scores
EPSS
0.8868
EPSS Percentile
99.5%
Details
VulnCheck KEV
2017-06-20
Status
published
Products (42)
hp/hp-ux
10.00
hp/hp-ux
10.01
hp/hp-ux
10.10
hp/hp-ux
10.20
hp/hp-ux
10.24
hp/hp-ux
11.00
hp/hp-ux
11.0.4
hp/hp-ux
11.11
ibm/aix
4.3
ibm/aix
4.3.1
... and 32 more
Published
Dec 12, 2001
Tracked Since
Feb 18, 2026