CVE-2002-0012

Current Description

Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.

Referenced by CVEs:CVE-2002-0053

Basic Data

PublishedFebruary 13, 2002
Last ModifiedOctober 12, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-264
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationSnmpSnmp********

Vulnerable Software List

VendorProductVersions
Snmp Snmp *

References

NameSourceURLTags
20020201-01-Aftp://patches.sgi.com/support/free/security/advisories/20020201-01-ASGIPatch Vendor Advisory
CA-2002-03http://www.cert.org/advisories/CA-2002-03.htmlCERTThird Party Advisory US Government Resource
http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.htmlhttp://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/index.htmlMISC
20020212 PROTOS Remote SNMP Attack Toolhttp://www.iss.net/security_center/alerts/advise110.phpISSVendor Advisory
VU#107186http://www.kb.cert.org/vuls/id/107186CERT-VNThird Party Advisory US Government Resource
RHSA-2001:163http://www.redhat.com/support/errata/RHSA-2001-163.htmlREDHATVendor Advisory
HPSBMP0206-015http://www.securityfocus.com/advisories/4211HPPatch Vendor Advisory
5043http://www.securityfocus.com/bid/5043BIDPatch
MS02-006https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-006MS
oval:org.mitre.oval:def:1048https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1048OVAL
oval:org.mitre.oval:def:144https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A144OVAL
oval:org.mitre.oval:def:161https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A161OVAL
oval:org.mitre.oval:def:298https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A298OVAL