Vulnerability Description
Buffer overflow in mtr 0.46 and earlier, when installed setuid root, allows local users to access a raw socket via a long MTR_OPTIONS environment variable.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mtr | Mtr | 0.41 |
References
- http://archives.neohapsis.com/archives/bugtraq/2002-03/0048.html
- http://www.debian.org/security/2002/dsa-124PatchVendor Advisory
- http://www.iss.net/security_center/static/8367.phpPatchVendor Advisory
- http://www.securityfocus.com/bid/4217ExploitPatchVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2002-03/0048.html
- http://www.debian.org/security/2002/dsa-124PatchVendor Advisory
- http://www.iss.net/security_center/static/8367.phpPatchVendor Advisory
- http://www.securityfocus.com/bid/4217ExploitPatchVendor Advisory
FAQ
What is CVE-2002-0497?
CVE-2002-0497 is a vulnerability with a CVSS score of 2.1 (LOW). Buffer overflow in mtr 0.46 and earlier, when installed setuid root, allows local users to access a raw socket via a long MTR_OPTIONS environment variable.
How severe is CVE-2002-0497?
CVE-2002-0497 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-0497?
Check the references section above for vendor advisories and patch information. Affected products include: Mtr Mtr.