mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
175 lines
5.6 KiB
JSON
175 lines
5.6 KiB
JSON
{
|
|
"id": "CVE-2002-1503",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2003-04-02T05:00:00.000",
|
|
"lastModified": "2008-09-05T20:30:46.233",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Buffer overflow in Automatic File Distributor (AFD) 1.2.14 and earlier allows local users to gain privileges via a long MON_WORK_DIR environment variable or -w (workdir) argument to (1) afd, (2) afdcmd, (3) afd_ctrl, (4) init_afd, (5) mafd, (6) mon_ctrl, (7) show_olog, or (8) udc."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de b\u00fafer en Automatic File Distributor (AFD) 1.2.14 y anteriores permite a usuarios locales ganar privilegios mediante una variable de entorno MON_WORK_DIR larga o un argumento -w (directorio de trabajo) a afd, adfcmd, afd_ctrl, init_afd, mafd, mon_ctrl, show_olog o udc"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 7.2
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "18185FE0-B4D2-4D28-B3C8-D04155A7A28C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "71339A84-D4CF-408C-BA72-37848A1DFF32"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "26F77A9A-AB30-41F1-8993-203346B6F08D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E2EF015-FEF3-45A9-81A1-7305D2A68069"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F1D7E6E-9DB8-4475-9F88-378B3CF647CD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4D2C504C-BDD7-4CD2-9DB0-D334672DB9F8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C745EB9D-02FE-4174-8BF1-AC4391218738"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DBFBDB97-195D-4F66-BCBB-9CE3F5DF7260"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "55B2B728-A465-4C97-9D48-9CE3F60F29B4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A1FCDC9-7FD7-4B33-951D-2E6DDDB75EF1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9286E737-E7B6-4C4E-883C-85A77CEBDC7E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D83E965C-5EEF-468B-A0FB-39A57125551A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.12:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2814774C-1831-41F5-AA55-24F39E1F2BD3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.13:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1AA282F9-D13C-4CBA-97B0-7020848904E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:afd:afd:1.2.14:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A922FE4-CA4C-476B-B65D-26137BB68ADD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://archives.neohapsis.com/archives/bugtraq/2002-09/0029.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.dwd.de/AFD/txt/CHANGES",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.iss.net/security_center/static/10036.php",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/5626",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |