Vulnerability Details : CVE-2002-0467
Buffer overflows in Ecartis (formerly Listar) 1.0.0 before snapshot 20020125 allows remote attackers to execute arbitrary code via (1) address_match() of mystring.c or (2) other functions in tolist.c.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2002-0467
Probability of exploitation activity in the next 30 days: 9.96%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2002-0467
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2002-0467
-
http://www.securityfocus.com/bid/4176
Patch;Vendor Advisory
- http://www.ecartis.org/
-
http://www.debian.org/security/2002/dsa-123
-
http://www.securityfocus.com/archive/1/261209
Vendor Advisory
-
http://www.iss.net/security_center/static/8284.php
Patch;Vendor Advisory
- http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0063.html
Products affected by CVE-2002-0467
- cpe:2.3:a:ecartis:ecartis:1.0.0_snapshot_2002-01-21:*:*:*:*:*:*:*
- cpe:2.3:a:listar:listar:0.126a:*:*:*:*:*:*:*
- cpe:2.3:a:listar:listar:0.127a:*:*:*:*:*:*:*
- cpe:2.3:a:listar:listar:0.129a:*:*:*:*:*:*:*