2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2001-0424" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2001-07-02T04:00:00.000" ,
2024-11-21 21:08:42 +00:00
"lastModified" : "2024-11-20T23:35:20.170" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "BubbleMon 1.31 does not properly drop group privileges before executing programs, which allows local users to execute arbitrary commands with the kmem group id."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:L/AC:L/Au:N/C:C/I:C/A:C" ,
2024-11-21 21:08:42 +00:00
"baseScore" : 7.2 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "LOCAL" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-21 21:08:42 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : true ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C003C029-AF0D-4A81-BB76-162CFAEE2953"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.0pl1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2EE380D1-55D7-48CC-BF42-71CB1DF7AE4C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.0pl2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "18915FDD-2978-46B5-B8F0-A96F6D31729B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.0pl3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "27D4BDF1-88D7-460D-88CB-043A93D8BB6F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.0pl4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5345E8C1-FAFF-4630-8206-C120698A9A47"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.0pl6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "938F7CF1-EE42-49FA-B2C8-06EF6916580A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.0pl7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CBB77607-2392-4268-B76B-90AD8A8D5DEF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.0pl8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "81BDABAC-C602-4AD7-A1B6-E71D3276D7FE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.0pl9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "458E695D-5AF8-48EC-ACA8-C96AE655E420"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33E6CB6B-4DA7-4652-B008-5429198888F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.1test1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "12A4FDBF-0E87-439C-A6F6-AF55009714A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.1test2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E7B539BB-5A06-4D02-BEBF-9808842930F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.1test3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C128ACA-693A-4ADE-BB0A-636E3C4ACB4A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.1test4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F5130AE-A6E7-4FB9-8E05-22BFF782A9C9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.1test5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E21C41C3-47B8-4489-8B6C-A45E18A80F8B"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.1test6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0C7E4F3D-4DD8-4716-81F8-6E77C93B609A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.1test7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A548C63F-39CD-4BFB-B55C-52FC5F0165B0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D678184D-3A09-44D8-9019-C77D8662C383"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.2test1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1E7702CB-8862-458A-BABC-3F9F8FF85DCB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78654BAA-CFA9-43B4-BFA8-84DFFDBA2BF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5D59FA70-FE73-458E-B269-6985C136783D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.21test1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D79A2E80-46DC-41AD-964B-1B9C25EDFB70"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "38505D60-E48E-493F-8573-A1184169EA18"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.23:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "538560BE-C6DD-4C80-B0B4-FF1995D74FD7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:timecop:bubblemon:1.31:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A8C39DD2-84C4-4CBD-9E90-08FB0003E544"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*" ,
"matchCriteriaId" : "32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://marc.info/?l=bugtraq&m=98744422105430&w=2" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/2609" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-11-21 21:08:42 +00:00
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=98744422105430&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/2609" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}