Vulnerability Details : CVE-2002-1506
Buffer overflow in Linuxconf before 1.28r4 allows local users to execute arbitrary code via a long LINUXCONF_LANG environment variable, which overflows an error string that is generated.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2002-1506
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ % EPSS Score History EPSS FAQ
CVSS scores for CVE-2002-1506
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2002-1506
-
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0093.html
-
http://www.iss.net/security_center/static/9980.php
Patch;Vendor Advisory
-
http://www.solucorp.qc.ca/changes.hc?projet=linuxconf&version=1.28r4
-
http://www.securityfocus.com/bid/5585
Exploit;Patch;Vendor Advisory
-
http://archives.neohapsis.com/archives/bugtraq/2002-08/0304.html
Exploit;Patch;Vendor Advisory
Products affected by CVE-2002-1506
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4r2:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.1.6r10:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.1.9r1:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.3r1:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.3r2:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.1.9r2:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r2:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r7:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4r5:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.27r3:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2r1:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r3:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r4:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r5:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r6:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.27r4:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.27r5:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.28:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.28r1:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.28r2:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r1:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r8:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4r4:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.27:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.28r3:*:*:*:*:*:*:*
- cpe:2.3:a:jacques_gelinas:linuxconf:1.2r2:*:*:*:*:*:*:*