Vulnerability Description
Buffer overflow in efax 0.9 and earlier, when installed setuid root, allows local users to execute arbitrary code via a long -x argument.
CVSS Score
7.2
HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Efax | Efax | 0.8a |
References
- http://marc.info/?l=vuln-dev&m=101133782204289&w=2
- http://seclists.org/bugtraq/2002/Jan/0212.html
- http://www.iss.net/security_center/static/7920.phpVendor Advisory
- http://www.securityfocus.com/bid/3894
- http://marc.info/?l=vuln-dev&m=101133782204289&w=2
- http://seclists.org/bugtraq/2002/Jan/0212.html
- http://www.iss.net/security_center/static/7920.phpVendor Advisory
- http://www.securityfocus.com/bid/3894
FAQ
What is CVE-2002-0130?
CVE-2002-0130 is a vulnerability with a CVSS score of 7.2 (HIGH). Buffer overflow in efax 0.9 and earlier, when installed setuid root, allows local users to execute arbitrary code via a long -x argument.
How severe is CVE-2002-0130?
CVE-2002-0130 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-0130?
Check the references section above for vendor advisories and patch information. Affected products include: Efax Efax.