CVE-2002-0973
Published Sep 24, 2002
Last updated 8 years ago
Overview
- Description
- Integer signedness error in several system calls for FreeBSD 4.6.1 RELEASE-p10 and earlier may allow attackers to access sensitive kernel memory via large negative values to the (1) accept, (2) getsockname, and (3) getpeername system calls, and the (4) vesa FBIO_GETPALETTE ioctl.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0A585A1-FF82-418F-90F8-072458DB7816" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE31DFF8-06AB-489D-A0C5-509C090283B5" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E8A6564-129A-4555-A5ED-6F65C56AE7B4" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "237174A4-E030-4A0B-AD0B-5C463603EAA4" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF49BF03-C25E-4737-84D5-892895C86C58" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D7F8F11-1869-40E2-8478-28B4E946D3CC" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D2019E0E-426B-43AF-8904-1B811AE171E8" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9062BAB5-D437-49BE-A384-39F62434B70B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E53C673-9D6D-42C8-A502-033E1FC28D97" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55C5FC1A-1253-4390-A4FC-573BB14EA937" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C844A170-B5A7-4703-AF3B-67366D44EA8B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44308D13-D935-4FF8-AB52-F0E115ED1AD2" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D41CB12-7894-4D25-80EC-23C56171D973" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09789843-6A1A-4CDB-97E8-89E82B79DDB5" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C001822-FDF8-497C-AC2C-B59A00E9ACD2" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "118211EF-CED7-4EB5-9669-F54C8169D4AE" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:4.6.1:release_p10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "01514C6C-0AFA-4668-9CE9-9429DDB888F2" } ], "operator": "OR" } ] } ]