{ "id": "CVE-2002-1500", "sourceIdentifier": "cve@mitre.org", "published": "2003-04-02T05:00:00.000", "lastModified": "2008-09-05T20:30:45.733", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Buffer overflow in (1) mrinfo, (2) mtrace, and (3) pppd in NetBSD 1.4.x through 1.6 allows local users to gain privileges by executing the programs after filling the file descriptor tables, which produces file descriptors larger than FD_SETSIZE, which are not checked by FD_SET()." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en mrinfo, mtrace, y pppd en NetBSD 1.4.x a 1.6 permite a usuarios locales ganar privilegios ejecutando los programas despues de rellenar las tablas de descritptores de ficherros, lo que produce descriptores de ficheros mayores que FD_SETSIZE, que no son comprobados por FD_SET()" } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 7.2 }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "C422E343-ADF2-427D-865D-B5C35431EFD1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:alpha:*:*:*:*:*", "matchCriteriaId": "87FD0350-38E2-46D3-B17F-6C3F9C3488A7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:arm32:*:*:*:*:*", "matchCriteriaId": "3DC541BB-95DF-4A31-998F-983255F8B485" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:sparc:*:*:*:*:*", "matchCriteriaId": "5AB998EB-E5F3-414D-AA99-34DC7B32E870" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:x86:*:*:*:*:*", "matchCriteriaId": "4319B741-4376-4EA2-9FEB-236C148D1514" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1C288A88-11C6-429E-A109-0395D0989264" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:alpha:*:*:*:*:*", "matchCriteriaId": "247ABD95-74CA-45B8-8729-3C35C9E11186" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:arm32:*:*:*:*:*", "matchCriteriaId": "1D4C44E8-075A-4B48-88DA-2CAC25CDF159" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:sh3:*:*:*:*:*", "matchCriteriaId": "393738E7-93E1-4A37-817B-C023A9BD1DBE" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:sparc:*:*:*:*:*", "matchCriteriaId": "19D1E7AC-79B6-4136-ADB2-06BEE9773795" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:x86:*:*:*:*:*", "matchCriteriaId": "E2EE8A19-8AB1-4283-95EA-9EE3C7E5DED7" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "516C6D9A-7483-4E36-A2E0-42698161AD31" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:alpha:*:*:*:*:*", "matchCriteriaId": "6FA1C84C-6624-4032-8D0E-5EBB054F5224" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:arm32:*:*:*:*:*", "matchCriteriaId": "06B9ADAD-ADDC-47AC-9924-B31B17DDF163" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:sparc:*:*:*:*:*", "matchCriteriaId": "6DC0D30E-DBF1-4FDB-80C0-80DB50D9E77A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:x86:*:*:*:*:*", "matchCriteriaId": "537FD523-1D44-4D85-AED1-C092E0155CF2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "B1F89124-E194-4C7A-B06D-8535B4066AA3" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*", "matchCriteriaId": "52F2B17F-A169-402C-AA05-0DE5D805BAD6" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*", "matchCriteriaId": "BD44E15F-D216-404F-8585-D278175C2A0F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47" }, { "vulnerable": true, "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418" } ] } ] } ], "references": [ { "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-014.txt.asc", "source": "cve@mitre.org" }, { "url": "http://www.iss.net/security_center/static/10114.php", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/5727", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] } ] }