CVE-2002-0572
Published Jul 3, 2002
Last updated 6 years ago
Overview
- Description
- FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FE1009B-371A-48E2-A456-935A1F0B7D0D" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D41CB12-7894-4D25-80EC-23C56171D973" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09789843-6A1A-4CDB-97E8-89E82B79DDB5" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36DF0D51-FCFA-46A3-B834-E80DFA91DFDC" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CB726CF-ADA2-4CDA-9786-1E84AC53740A" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FC373FC-88AC-4B6D-A289-51881ACD57F7" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D2DA7F0-E3C0-447A-A2B0-ECC928389D84" }, { "criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F66BAF35-A8B9-4E95-B270-444206FDD35B" }, { "criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B" }, { "criteria": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F1F312C-413F-4DB4-ABF4-48E33F6FECF2" }, { "criteria": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1894C542-AA81-40A9-BF47-AE24C93C1ACB" }, { "criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB" }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A" }, { "criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759" }, { "criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224" } ], "operator": "OR" } ] } ]