CVE-2002-0532
Published Aug 12, 2002
Last updated 16 years ago
Overview
- Description
- EMU Webmail allows local users to execute arbitrary programs via a .. (dot dot) in the HTTP Host header that points to a Trojan horse configuration file that contains a pageroot specifier that contains shell metacharacters.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:emumail:emumail:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4202D61D-D727-40D7-BAC4-8EF3EA824CD4" }, { "criteria": "cpe:2.3:a:emumail:emumail_red_hat_linux:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6E730ED-DB66-4E3C-816D-BFDB9E26C98A" }, { "criteria": "cpe:2.3:a:emumail:emumail_red_hat_linux:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97FDBEF6-425A-44DC-B668-B306720AB666" }, { "criteria": "cpe:2.3:a:emumail:emumail_unix:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "050D6915-EF9C-4C5C-BFA1-C8A445058D91" }, { "criteria": "cpe:2.3:a:emumail:emumail_unix:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91BBEE72-62E8-4CC3-B2DD-727407151BC9" } ], "operator": "OR" } ] } ]