Vulnerability Description
Buffer overflow in Abuse 2.00 and earlier allows local users to gain root privileges via a long -net command line argument.
CVSS Score
7.2
HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Abuse | Abuse | <= 2.00 |
References
- http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0055.html
- http://www.idefense.com/advisory/11.01.02.txtExploitPatchVendor Advisory
- http://www.iss.net/security_center/static/10519.phpVendor Advisory
- http://www.securityfocus.com/bid/6094
- http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0055.html
- http://www.idefense.com/advisory/11.01.02.txtExploitPatchVendor Advisory
- http://www.iss.net/security_center/static/10519.phpVendor Advisory
- http://www.securityfocus.com/bid/6094
FAQ
What is CVE-2002-1250?
CVE-2002-1250 is a vulnerability with a CVSS score of 7.2 (HIGH). Buffer overflow in Abuse 2.00 and earlier allows local users to gain root privileges via a long -net command line argument.
How severe is CVE-2002-1250?
CVE-2002-1250 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-1250?
Check the references section above for vendor advisories and patch information. Affected products include: Abuse Abuse.