2017-10-16 12:31:07 -04:00
{
2019-03-18 01:36:47 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2002-0391" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-18 01:36:47 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "sunrpc-xdr-array-bo(9170)" ,
"refsource" : "XF" ,
"url" : "http://www.iss.net/security_center/static/9170.php"
} ,
{
"name" : "20020801-01-A" ,
"refsource" : "SGI" ,
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A"
} ,
{
"name" : "CA-2002-25" ,
"refsource" : "CERT" ,
"url" : "http://www.cert.org/advisories/CA-2002-25.html"
} ,
{
"name" : "HPSBTL0208-061" ,
"refsource" : "HP" ,
"url" : "http://online.securityfocus.com/advisories/4402"
} ,
{
"name" : "20020909 GLSA: glibc" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://marc.info/?l=bugtraq&m=103158632831416&w=2"
} ,
{
"name" : "DSA-146" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2002/dsa-146"
} ,
{
"name" : "RHSA-2002:166" ,
"refsource" : "REDHAT" ,
"url" : "http://rhn.redhat.com/errata/RHSA-2002-166.html"
} ,
{
"name" : "HPSBUX0209-215" ,
"refsource" : "HP" ,
"url" : "http://archives.neohapsis.com/archives/hp/2002-q3/0077.html"
} ,
{
"name" : "CSSA-2002-055.0" ,
"refsource" : "CALDERA" ,
"url" : "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt"
} ,
{
"name" : "DSA-143" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2002/dsa-143"
} ,
{
"name" : "20020731 Remote Buffer Overflow Vulnerability in Sun RPC" ,
"refsource" : "ISS" ,
"url" : "http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823"
} ,
{
"name" : "20020801-01-P" ,
"refsource" : "SGI" ,
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P"
} ,
{
"name" : "CLA-2002:515" ,
"refsource" : "CONECTIVA" ,
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515"
} ,
{
"name" : "CLA-2002:535" ,
"refsource" : "CONECTIVA" ,
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535"
} ,
{
"name" : "RHSA-2003:212" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2003-212.html"
} ,
{
"name" : "MS02-057" ,
"refsource" : "MS" ,
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057"
} ,
{
"name" : "DSA-142" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2002/dsa-142"
} ,
{
"name" : "NetBSD-SA2002-011" ,
"refsource" : "NETBSD" ,
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc"
} ,
{
"name" : "IY34194" ,
"refsource" : "AIXAPAR" ,
"url" : "http://archives.neohapsis.com/archives/aix/2002-q4/0002.html"
} ,
{
"name" : "RHSA-2002:167" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2002-167.html"
} ,
{
"name" : "20020803 OpenAFS Security Advisory 2002-001: Remote root vulnerability in OpenAFS servers" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html"
} ,
{
"name" : "FreeBSD-SA-02:34.rpc" ,
"refsource" : "FREEBSD" ,
"url" : "http://marc.info/?l=bugtraq&m=102821928418261&w=2"
} ,
{
"name" : "RHSA-2002:173" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2002-173.html"
} ,
{
"name" : "5356" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/5356"
} ,
{
"name" : "20020802 kerberos rpc xdr_array" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://online.securityfocus.com/archive/1/285740"
} ,
{
"name" : "20020731 Remote Buffer Overflow Vulnerability in Sun RPC" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://marc.info/?l=bugtraq&m=102813809232532&w=2"
} ,
{
"name" : "20020801 RPC analysis" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://marc.info/?l=bugtraq&m=102821785316087&w=2"
} ,
{
"name" : "VU#192995" ,
"refsource" : "CERT-VN" ,
"url" : "http://www.kb.cert.org/vuls/id/192995"
} ,
{
"name" : "RHSA-2002:172" ,
"refsource" : "REDHAT" ,
"url" : "http://rhn.redhat.com/errata/RHSA-2002-172.html"
} ,
{
"name" : "oval:org.mitre.oval:def:4728" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728"
} ,
{
"name" : "oval:org.mitre.oval:def:42" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42"
} ,
{
"name" : "ESA-20021003-021" ,
"refsource" : "ENGARDE" ,
"url" : "http://www.linuxsecurity.com/advisories/other_advisory-2399.html"
} ,
{
"name" : "oval:org.mitre.oval:def:9" ,
"refsource" : "OVAL" ,
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9"
} ,
{
"name" : "MDKSA-2002:057" ,
"refsource" : "MANDRAKE" ,
"url" : "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057"
} ,
{
"name" : "DSA-149" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2002/dsa-149"
} ,
{
"name" : "20020802 MITKRB5-SA-2002-001: Remote root vulnerability in MIT krb5 admin" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://marc.info/?l=bugtraq&m=102831443208382&w=2"
} ,
{
"name" : "DSA-333" ,
"refsource" : "DEBIAN" ,
"url" : "http://www.debian.org/security/2003/dsa-333"
} ,
{
"name" : "RHSA-2003:168" ,
"refsource" : "REDHAT" ,
"url" : "http://www.redhat.com/support/errata/RHSA-2003-168.html"
}
]
}
}