2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2002-1506" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2003-04-02T05:00:00.000" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-20T23:41:28.097" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Buffer overflow in Linuxconf before 1.28r4 allows local users to execute arbitrary code via a long LINUXCONF_LANG environment variable, which overflows an error string that is generated."
} ,
{
"lang" : "es" ,
"value" : "Desbordamiento de b\u00fafer en Linuxconf anteriores a 1.28r4 permite a usuarios locales ejecutra c\u00f3digo arbitrario mediante una variable de entorno LINUXCONF_LANG larga, que desborda la cadena de error que es generada."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.2 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : true ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.1.6r10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9853424F-C0CC-4A19-9D53-D5E7BA577133"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.1.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E570648A-8C93-485B-9499-DEED1D7735F0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.1.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9BAA2C45-43A1-405B-A55A-E5E4F31079F4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.1.9r1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "16A67340-96F1-4EDD-8304-539C9A53C11F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.1.9r2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0A97F11A-ECF0-4698-B354-BDCCBE86EE59"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "375587F6-5153-4AFF-AA8F-F8B629CCE001"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6D391B62-8A38-46D8-8A72-E15D5678355E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "57CD7961-45B6-47F5-9D37-987A412CF671"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9DDD8D1B-FF97-48AA-9E09-25B0BE7B0F38"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "900BFF8B-7B1F-4AEA-A529-9C854644F3CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C7AC866B-4E71-44E2-8CBD-BC5A6C0EE52A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7FB4CC18-3F46-4638-9AD9-0534D41104D2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2D556B92-3375-4DC7-816D-92A0926B9C2C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B67251C4-FF58-4EF5-B25D-B7BB4D1FA854"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BEE116B4-2ABB-43EB-8D3A-AACCB4C3A0E5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3175C4DC-DFEF-4451-8129-D1EB0FEEE8E9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF154EAB-2989-4631-A1CF-06F9C813B899"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.3r1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C86B5DB7-4993-4772-8B46-9AFB3DD6C3BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.3r2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4B58B9B9-66BC-4CF5-8893-675E142E8F8E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4AD848E9-F0D1-47E2-91E6-8BE92F291E55"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4r2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7C45B663-58B9-428F-A35D-876F2FFD4A86"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4r4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0DA3A473-1C58-4EBD-8CF4-3614001245AD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4r5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "66BF5178-90CA-4953-BCB7-55D0FEC93E53"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2r1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8D4868BB-DD08-4301-A1CD-E48AD89F7E7F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.2r2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9146151C-2C4B-4EF4-8654-A683C69D889D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.27:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2E68CF3-41FD-47BB-9C9F-6730AE48AADE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.27r3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "52FAD2CC-3989-4CF4-9E81-00D14BC99BDF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.27r4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5B28E3BB-8220-4DD8-AFC9-CDDE0DE660FC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.27r5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BD5403ED-24CF-4827-ACE1-663E40E91323"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.28:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8B1C28A6-7D27-4692-A78E-FA62B455D39F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.28r1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "50E99793-8EBA-434A-B354-B9E25CE02ABC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.28r2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A4BA9B1D-ECA8-43E7-8964-E123685DE6D7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:jacques_gelinas:linuxconf:1.28r3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6B57C5D5-D248-43B0-93AA-E19BC0EF9142"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-08/0304.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0093.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.iss.net/security_center/static/9980.php" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/5585" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.solucorp.qc.ca/changes.hc?projet=linuxconf&version=1.28r4" ,
"source" : "cve@mitre.org"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://archives.neohapsis.com/archives/bugtraq/2002-08/0304.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0093.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.iss.net/security_center/static/9980.php" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/5585" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.solucorp.qc.ca/changes.hc?projet=linuxconf&version=1.28r4" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}