CVE-2002-0971
Published Sep 24, 2002
Last updated 8 years ago
Overview
- Description
- Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the "Add new clients" dialogue box.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:att:winvnc_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CA6820A-D28A-49C6-A6D6-D54F95274FE3", "versionEndIncluding": "3.3.3_r9" }, { "criteria": "cpe:2.3:a:att:winvnc_server:3.3.3_r7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FEAAE30-8DA0-4C04-B745-FECCEA0685ED" }, { "criteria": "cpe:2.3:a:tightvnc:tightvnc:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2F4EE57-DA68-4438-A401-BAC82B7242D2" }, { "criteria": "cpe:2.3:a:tightvnc:tightvnc:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9E11A57-016E-4720-A266-A53743629CD8" }, { "criteria": "cpe:2.3:a:tightvnc:tightvnc:1.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FD5B03E-D897-4A06-A3EF-62B13B46B7EF" }, { "criteria": "cpe:2.3:a:tridia:tridiavnc:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1E2C09A-A649-4E4C-BC75-45F456546B72" }, { "criteria": "cpe:2.3:a:tridia:tridiavnc:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39675379-9A88-40AE-85A1-F0E4ADEA1A17" }, { "criteria": "cpe:2.3:a:tridia:tridiavnc:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40879BF2-41EB-4170-A7EC-223CB22A83ED" }, { "criteria": "cpe:2.3:a:tridia:tridiavnc:1.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13622F73-D0BF-41DD-976F-4926FA5744CC" } ], "operator": "OR" } ] } ]