2024-12-08 03:06:42 +00:00

89 lines
2.6 KiB
JSON

{
"id": "CVE-2002-0854",
"sourceIdentifier": "cve@mitre.org",
"published": "2002-09-05T04:00:00.000",
"lastModified": "2024-11-20T23:40:02.160",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflows in ISDN Point to Point Protocol (PPP) daemon (ipppd) in the i4l package on SuSE 7.3, 8.0, and possibly other operating systems, may allow local users to gain privileges."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en el demonio (daemon) ISDN Point to Point Protocol (PPP) del paquete i4l de SuSE 7.3, 8.0, y posiblemente otros sistemas operativos, podr\u00edan permitir a usuarios locales, la obtenci\u00f3n de privilegios."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 7.2,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:suse_linux:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FAE3FF4F-646F-4E05-A08A-C9399DEF60F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28CD54FE-D682-4063-B7C3-8B29B26B39AD"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.opensuse.org/opensuse-security-announce/2002-08/msg00006.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.opensuse.org/opensuse-security-announce/2002-08/msg00006.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}