CVE-2002-1500
Published Apr 2, 2003
Last updated 16 years ago
Overview
- Description
- Buffer overflow in (1) mrinfo, (2) mtrace, and (3) pppd in NetBSD 1.4.x through 1.6 allows local users to gain privileges by executing the programs after filling the file descriptor tables, which produces file descriptors larger than FD_SETSIZE, which are not checked by FD_SET().
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C422E343-ADF2-427D-865D-B5C35431EFD1" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87FD0350-38E2-46D3-B17F-6C3F9C3488A7" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:arm32:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DC541BB-95DF-4A31-998F-983255F8B485" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AB998EB-E5F3-414D-AA99-34DC7B32E870" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4319B741-4376-4EA2-9FEB-236C148D1514" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C288A88-11C6-429E-A109-0395D0989264" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "247ABD95-74CA-45B8-8729-3C35C9E11186" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:arm32:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D4C44E8-075A-4B48-88DA-2CAC25CDF159" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:sh3:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "393738E7-93E1-4A37-817B-C023A9BD1DBE" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19D1E7AC-79B6-4136-ADB2-06BEE9773795" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.1:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2EE8A19-8AB1-4283-95EA-9EE3C7E5DED7" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "516C6D9A-7483-4E36-A2E0-42698161AD31" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FA1C84C-6624-4032-8D0E-5EBB054F5224" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:arm32:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06B9ADAD-ADDC-47AC-9924-B31B17DDF163" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DC0D30E-DBF1-4FDB-80C0-80DB50D9E77A" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.2:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "537FD523-1D44-4D85-AED1-C092E0155CF2" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1F89124-E194-4C7A-B06D-8535B4066AA3" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52F2B17F-A169-402C-AA05-0DE5D805BAD6" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BD44E15F-D216-404F-8585-D278175C2A0F" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418" } ], "operator": "OR" } ] } ]