2025-04-03 02:06:18 +00:00

132 lines
3.6 KiB
JSON

{
"id": "CVE-2002-1239",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-11-12T05:00:00.000",
"lastModified": "2025-04-03T01:03:51.193",
"vulnStatus": "Deferred",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "QNX Neutrino RTOS 6.2.0 uses the PATH environment variable to find and execute the cp program while operating at raised privileges, which allows local users to gain privileges by modifying the PATH to point to a malicious cp program."
},
{
"lang": "es",
"value": "QNX Neutrino RTOS 6.2.0 usa la variable de entorno PATH para encontrar y ejecutar el programa cp mientras opera con privilegios elevados, lo que permite a usuarios locales ganar privilegios modificando PATH para que apunte a un programa cp malicioso."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 7.2,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnx:rtos:6.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7B3A983E-7A0C-4BA9-AC9C-131437BFE793"
}
]
}
]
}
],
"references": [
{
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0066.html",
"source": "cve@mitre.org"
},
{
"url": "http://marc.info/?l=bugtraq&m=103679043232178&w=2",
"source": "cve@mitre.org"
},
{
"url": "http://www.idefense.com/advisory/11.08.02b.txt",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.iss.net/security_center/static/10564.php",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/6146",
"source": "cve@mitre.org"
},
{
"url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0066.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://marc.info/?l=bugtraq&m=103679043232178&w=2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.idefense.com/advisory/11.08.02b.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.iss.net/security_center/static/10564.php",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/6146",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}