CVE-2002-1380
Published Dec 23, 2002
Last updated 7 years ago
Overview
- Description
- Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD7A6B55-2F3B-422E-B1F2-80B482FE89AA" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70DCE8FF-40C3-44F7-8185-0422ADDA051B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DAC3A7C-2092-46D4-908B-CF03F4217112" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "956B7F2F-DE46-492F-ACA3-BD5EE7EA14F3" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE77B8D6-EF2A-4EC2-AF75-B6FA48747781" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAEC8651-9291-4CAE-AA49-C1CA4C7AE450" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A6F3945-21ED-44C6-86D2-B7755A87014E" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4919EB3-625C-4D83-8DCB-72BCF05DF2C6" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5DDB008-E88E-473C-B030-AF9B6F5E4E48" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA3D3E03-0ABE-4325-AD67-BA8EA16B6DBE" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E48C9A9-B7E6-4314-BCEF-8013BBB4276E" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EEF4480-D50B-464C-AE39-A12455DBC99F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6BBFD0DB-0A18-4545-9B4B-697AAC11E9C5" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "15928E10-7D41-45B2-87D6-8AA10190A8EB" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C18E13C4-F42D-4168-B25E-544E1549C46B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F0DB9B7C-3608-44E3-AE47-D231D1F7B8EC" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4947CDE-CB89-456B-8B5F-0E17B46BC893" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6ECB42B3-70C6-4019-8B8B-8EB7A84B39AF" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF701E58-35E8-4DDE-B832-C5A23E61A3CA" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C122CC4-B8CB-4AB9-8571-6F3D302F56A7" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2498D898-D243-4D0C-9AEF-0138D19A68B9" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3924060B-1EC1-4003-B306-E327634E7797" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D45B43DF-FD4C-4C37-9569-1CCE450B8987" } ], "operator": "OR" } ] } ]