2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2002-1233" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2002-11-04T05:00:00.000" ,
"lastModified" : "2016-10-18T02:25:03.290" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A regression error in the Debian distributions of the apache-ssl package (before 1.3.9 on Debian 2.2, and before 1.3.26 on Debian 3.0), for Apache 1.3.27 and earlier, allows local users to read or modify the Apache password file via a symlink attack on temporary files when the administrator runs (1) htpasswd or (2) htdigest, a re-introduction of a vulnerability that was originally identified and addressed by CVE-2001-0131."
} ,
{
"lang" : "es" ,
"value" : "Apache 1.3.27 y anteriores, y posiblemente versiones posteriores, puede permitir a usuarios locales leer o modificar el fichero de contrase\u00f1as de Apache mediante un ataque de enlaces simb\u00f3licos en ficheros temporales cuando el administrador de Apache corre htpasswd o htdigest."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:H/Au:N/C:P/I:P/A:N" ,
"accessVector" : "LOCAL" ,
"accessComplexity" : "HIGH" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 2.6
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 1.9 ,
"impactScore" : 4.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A80B17D-FD66-40BD-9ADC-FE7A3944A696"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.17:*:win32:*:*:*:*:*" ,
"matchCriteriaId" : "780FEC59-8720-4C81-8924-F25577633B24"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "713ADED4-CBE5-40C3-A128-99CFABF24560"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.18:*:win32:*:*:*:*:*" ,
"matchCriteriaId" : "A6938AFA-D836-4F85-9595-27799D476F0A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "70FA0B8E-1A90-4939-871A-38B9E93BCCC1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.19:*:win32:*:*:*:*:*" ,
"matchCriteriaId" : "46B27279-DB34-4B9C-A84C-3ED872A43599"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "83BDEAE5-29B9-48E3-93FA-F30832044C9A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.20:*:win32:*:*:*:*:*" ,
"matchCriteriaId" : "3F8DACCB-5DE4-4ED5-B277-7CF262FF4E68"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2720E06-1B0E-4BFE-8C85-A17E597BB151"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.22:*:win32:*:*:*:*:*" ,
"matchCriteriaId" : "98477E82-3EF0-4DBB-B40D-6AD620EE4220"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3EE1DECF-36C7-4968-8B7A-7A2034C2A957"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.23:*:win32:*:*:*:*:*" ,
"matchCriteriaId" : "29BC4A8B-B4E9-40E7-83EE-E00F83033019"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B67BD173-8517-4E97-BC65-D9657C63601A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.24:*:win32:*:*:*:*:*" ,
"matchCriteriaId" : "5352DB14-3DE4-4A3B-BB1A-AD287F6CB4C5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B392A96F-FD2F-4073-8EED-EB31E1F20FE4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.25:*:win32:*:*:*:*:*" ,
"matchCriteriaId" : "A9B53062-64C4-4E29-943D-2D5D5463E31F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E130104B-86F5-411E-8AC0-9B4B780BCA00"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.26:*:win32:*:*:*:*:*" ,
"matchCriteriaId" : "83841318-8B3E-4F9B-87EA-5B0FBA488822"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0E62E621-74DA-4D99-A79C-AD2B85896A2B"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://marc.info/?l=bugtraq&m=103480856102007&w=2" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.debian.org/security/2002/dsa-187" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.debian.org/security/2002/dsa-188" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.debian.org/security/2002/dsa-195" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.iss.net/security_center/static/10412.php" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.iss.net/security_center/static/10413.php" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/5981" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/5990" ,
"source" : "cve@mitre.org"
}
]
}