CVE-2002-0658
Published Aug 12, 2002
Last updated 11 years ago
Overview
- Description
- OSSP mm library (libmm) before 1.2.0 allows the local Apache user to gain privileges via temporary files, possibly via a symbolic link attack.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.2
- Impact score
- 10
- Exploitability score
- 1.9
- Vector string
- AV:L/AC:H/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ossp:mm:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "270D8217-749C-42AA-BFCF-29F30A005F33" }, { "criteria": "cpe:2.3:a:ossp:mm:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19AD7B27-55CB-4B74-8FF8-51055303E237" }, { "criteria": "cpe:2.3:a:ossp:mm:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "563BCC1D-D9B7-4A4D-B236-80CD4F3CEA00" }, { "criteria": "cpe:2.3:a:ossp:mm:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61D170FC-54D4-47E0-B2D1-DB595A856962" }, { "criteria": "cpe:2.3:a:ossp:mm:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9853936-1570-4EF1-91D2-DA3E75B5896B" }, { "criteria": "cpe:2.3:a:ossp:mm:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26C013B0-9AAC-40A0-9FC8-D28E1C0AEDFF" }, { "criteria": "cpe:2.3:a:ossp:mm:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D97522C-3140-4321-AE49-381E950EC5B1" }, { "criteria": "cpe:2.3:a:ossp:mm:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B0B47A8-1730-44FA-BEB4-4EEDA53B9E06" }, { "criteria": "cpe:2.3:a:ossp:mm:1.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89674C7D-1C76-490D-8357-69C395BBED51" }, { "criteria": "cpe:2.3:a:ossp:mm:1.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1EB315F4-5225-4EA6-A48F-8AC7546B0155" }, { "criteria": "cpe:2.3:a:ossp:mm:1.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "034F3E12-D0ED-4533-8CA3-D7BDE44DFA51" }, { "criteria": "cpe:2.3:a:ossp:mm:1.0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1935CCB9-24A8-4B04-BBA7-5452B622A646" }, { "criteria": "cpe:2.3:a:ossp:mm:1.0.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35D77BDD-F1F0-4E63-AFFE-E52F167A7E8C" }, { "criteria": "cpe:2.3:a:ossp:mm:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CFDE079-DBEE-43C4-A8E6-0BDF15E2E471" }, { "criteria": "cpe:2.3:a:ossp:mm:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B39122A-961C-4A63-BEA3-E45B14AC4053" }, { "criteria": "cpe:2.3:a:ossp:mm:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB1AE08F-D8B1-4A3E-B032-1A58408C79B5" }, { "criteria": "cpe:2.3:a:ossp:mm:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EB8773A-D67C-4411-8AEB-00BC31A269A0" } ], "operator": "OR" } ] } ]