Vulnerability Details : CVE-2001-1384
ptrace in Linux 2.2.x through 2.2.19, and 2.4.x through 2.4.9, allows local users to gain root privileges by running ptrace on a setuid or setgid program that itself calls an unprivileged program, such as newgrp.
Threat overview for CVE-2001-1384
Top countries where our scanners detected CVE-2001-1384
Top open port discovered on systems with this issue
80
IPs affected by CVE-2001-1384 32
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2001-1384!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2001-1384
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ % EPSS Score History EPSS FAQ
CVSS scores for CVE-2001-1384
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2001-1384
-
http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-079.php3
-
http://www.securityfocus.com/bid/3447
-
http://www.iss.net/security_center/static/7311.php
Patch;Vendor Advisory
-
http://online.securityfocus.com/advisories/3713
- http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-082.php3
-
http://www.redhat.com/support/errata/RHSA-2001-129.html
- http://marc.info/?l=bugtraq&m=100350685431610&w=2
- http://www.novell.com/linux/security/advisories/2001_036_kernel_txt.html
- http://marc.info/?l=bugtraq&m=100343090106914&w=2
-
http://www.linuxsecurity.com/advisories/other_advisory-1650.html
Patch;Vendor Advisory
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2001-036.0.txt
- http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-035-01
-
http://www.redhat.com/support/errata/RHSA-2001-130.html
Products affected by CVE-2001-1384
- cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*