Vulnerability Details : CVE-2002-1742
SOAP::Lite 0.50 through 0.52 allows remote attackers to load arbitrary Perl functions by suppling a non-existent function in a script using a SOAP::Lite module, which causes the AUTOLOAD subroutine to trigger.
Products affected by CVE-2002-1742
- cpe:2.3:a:paul_kulchenko:soap_lite:0.51:*:*:*:*:*:*:*
- cpe:2.3:a:paul_kulchenko:soap_lite:0.52:*:*:*:*:*:*:*
- cpe:2.3:a:paul_kulchenko:soap_lite:0.50:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-1742
1.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-1742
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2002-1742
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/8838
-
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A02.asc
Vendor Advisory
-
http://www.phrack.org/show.php?p=58&a=9
Vendor Advisory
-
http://www.soaplite.com/
Patch
-
http://www.securityfocus.com/bid/4493
Patch
-
http://use.perl.org/articles/02/04/09/000212.shtml?tid=5
Patch
Jump to