René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

205 lines
7.2 KiB
JSON

{
"id": "CVE-2002-1500",
"sourceIdentifier": "cve@mitre.org",
"published": "2003-04-02T05:00:00.000",
"lastModified": "2008-09-05T20:30:45.733",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in (1) mrinfo, (2) mtrace, and (3) pppd in NetBSD 1.4.x through 1.6 allows local users to gain privileges by executing the programs after filling the file descriptor tables, which produces file descriptors larger than FD_SETSIZE, which are not checked by FD_SET()."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en mrinfo, mtrace, y pppd en NetBSD 1.4.x a 1.6 permite a usuarios locales ganar privilegios ejecutando los programas despues de rellenar las tablas de descritptores de ficherros, lo que produce descriptores de ficheros mayores que FD_SETSIZE, que no son comprobados por FD_SET()"
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": true,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C422E343-ADF2-427D-865D-B5C35431EFD1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:alpha:*:*:*:*:*",
"matchCriteriaId": "87FD0350-38E2-46D3-B17F-6C3F9C3488A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:arm32:*:*:*:*:*",
"matchCriteriaId": "3DC541BB-95DF-4A31-998F-983255F8B485"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:sparc:*:*:*:*:*",
"matchCriteriaId": "5AB998EB-E5F3-414D-AA99-34DC7B32E870"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:x86:*:*:*:*:*",
"matchCriteriaId": "4319B741-4376-4EA2-9FEB-236C148D1514"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1C288A88-11C6-429E-A109-0395D0989264"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:alpha:*:*:*:*:*",
"matchCriteriaId": "247ABD95-74CA-45B8-8729-3C35C9E11186"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:arm32:*:*:*:*:*",
"matchCriteriaId": "1D4C44E8-075A-4B48-88DA-2CAC25CDF159"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:sh3:*:*:*:*:*",
"matchCriteriaId": "393738E7-93E1-4A37-817B-C023A9BD1DBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:sparc:*:*:*:*:*",
"matchCriteriaId": "19D1E7AC-79B6-4136-ADB2-06BEE9773795"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:x86:*:*:*:*:*",
"matchCriteriaId": "E2EE8A19-8AB1-4283-95EA-9EE3C7E5DED7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "516C6D9A-7483-4E36-A2E0-42698161AD31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:alpha:*:*:*:*:*",
"matchCriteriaId": "6FA1C84C-6624-4032-8D0E-5EBB054F5224"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:arm32:*:*:*:*:*",
"matchCriteriaId": "06B9ADAD-ADDC-47AC-9924-B31B17DDF163"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:sparc:*:*:*:*:*",
"matchCriteriaId": "6DC0D30E-DBF1-4FDB-80C0-80DB50D9E77A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:x86:*:*:*:*:*",
"matchCriteriaId": "537FD523-1D44-4D85-AED1-C092E0155CF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B1F89124-E194-4C7A-B06D-8535B4066AA3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*",
"matchCriteriaId": "52F2B17F-A169-402C-AA05-0DE5D805BAD6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*",
"matchCriteriaId": "BD44E15F-D216-404F-8585-D278175C2A0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418"
}
]
}
]
}
],
"references": [
{
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-014.txt.asc",
"source": "cve@mitre.org"
},
{
"url": "http://www.iss.net/security_center/static/10114.php",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/5727",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}