CVE-2002-1814
Published Dec 31, 2002
Last updated 16 years ago
Overview
- Description
- Buffer overflow in efstools in Bonobo, when installed setuid, allows local users to execute arbitrary code via long command line arguments.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:gnome:bonobo:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD879CDE-5533-4F50-ADFE-C7780961A03A" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EC1FF5D-5EAB-44D5-B281-770547C70D68" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4371A667-18E1-4C54-B2E1-6F885F22F213" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B28763D-8F4B-45E5-82FA-AB7E54C18EBF" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33F6F859-B7B8-4072-B073-6CC8291D642E" }, { "criteria": "cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "344610A8-DB6D-4407-9304-916C419F648C" }, { "criteria": "cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7EC2B95-4715-4EC9-A10A-2542501F8A61" }, { "criteria": "cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64775BEF-2E53-43CA-8639-A7E54F6F4222" }, { "criteria": "cpe:2.3:o:redhat:linux:7.0:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD6576E2-9F26-4857-9F28-F51899F1EF48" }, { "criteria": "cpe:2.3:o:redhat:linux:7.0:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4DC9842D-E23B-4B9F-A7BF-57C3BA3DE398" }, { "criteria": "cpe:2.3:o:redhat:linux:7.0:*:sparc:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1DE93B9-1ADD-4B19-BA32-7D9F9CCD293F" }, { "criteria": "cpe:2.3:o:redhat:linux:7.1:*:alpha:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F3FAAB3-7A8A-42E5-9DCE-E4A843CED1B9" }, { "criteria": "cpe:2.3:o:redhat:linux:7.1:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8783A6D-DFD8-45DD-BF03-570B1B012B44" }, { "criteria": "cpe:2.3:o:redhat:linux:7.1:*:ia64:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED36543D-C21B-4B4B-A6AD-6E19B08B5DD7" }, { "criteria": "cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78D76664-F4AC-470A-9686-3F708922A340" } ], "operator": "OR" } ] } ]