CVE-2002-0158

Current Description

Buffer overflow in Xsun on Solaris 2.6 through 8 allows local users to gain root privileges via a long -co (color database) command line argument.

Basic Data

PublishedApril 02, 2002
Last ModifiedOctober 30, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSSunSolaris2.6*sparc*****
    2.3OSSunSolaris7.0*sparc*****
    2.3OSSunSolaris7.0*x86*****
    2.3OSSunSolaris8.0*sparc*****
    2.3OSSunSolaris8.0*x86*****
    2.3OSSunSunos-*******

Vulnerable Software List

VendorProductVersions
Sun Solaris 2.6, 7.0, 8.0
Sun Sunos -

References

NameSourceURLTags
20020402 NSFOCUS SA2002-01: Sun Solaris Xsun "-co" heap overflowhttp://archives.neohapsis.com/archives/vulnwatch/2002-q2/0000.htmlVULNWATCHExploit Patch Vendor Advisory
20020402 NSFOCUS SA2002-01: Sun Solaris Xsun "-co" heap overflowhttp://marc.info/?l=bugtraq&m=101776858410652&w=2BUGTRAQ
http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fpatches%2F108652http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fpatches%2F108652CONFIRM
4408http://www.securityfocus.com/bid/4408BID
solaris-xsun-co-bo(8703)https://exchange.xforce.ibmcloud.com/vulnerabilities/8703XF
oval:org.mitre.oval:def:14https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14OVAL
oval:org.mitre.oval:def:33https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A33OVAL