Vulnerability Description
Buffer overflow in cnd-program for mgetty before 1.1.29 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a Caller ID string with a long CallerName argument.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gert Doering | Mgetty | <= 1.1.29 |
References
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-021.0.txt
- http://marc.info/?l=bugtraq&m=105154413326136&w=2
- http://search.alphanet.ch/cgi-bin/search.cgi?msgid=20021125142338.E12094%40greenVendor Advisory
- http://www.redhat.com/support/errata/RHSA-2003-008.html
- http://www.redhat.com/support/errata/RHSA-2003-036.html
- http://www.securityfocus.com/bid/7303
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11072
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-021.0.txt
- http://marc.info/?l=bugtraq&m=105154413326136&w=2
- http://search.alphanet.ch/cgi-bin/search.cgi?msgid=20021125142338.E12094%40greenVendor Advisory
- http://www.redhat.com/support/errata/RHSA-2003-008.html
- http://www.redhat.com/support/errata/RHSA-2003-036.html
- http://www.securityfocus.com/bid/7303
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11072
FAQ
What is CVE-2002-1391?
CVE-2002-1391 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in cnd-program for mgetty before 1.1.29 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a Caller ID string with a long CallerName argument.
How severe is CVE-2002-1391?
CVE-2002-1391 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-1391?
Check the references section above for vendor advisories and patch information. Affected products include: Gert Doering Mgetty.