Vulnerability Description
Buffer overflow in setlocale in libc on NetBSD 1.4.x through 1.6, and possibly other operating systems, when called with the LC_ALL category, allows local attackers to execute arbitrary code via a user-controlled locale string that has more than 6 elements, which exceeds the boundaries of the new_categories category array, as exploitable through programs such as xterm and zsh.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netbsd | Netbsd | 1.4 |
References
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-012.txt.asc
- http://www.iss.net/security_center/static/10159.phpPatchVendor Advisory
- http://www.osvdb.org/7565
- http://www.securityfocus.com/bid/5724PatchVendor Advisory
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-012.txt.asc
- http://www.iss.net/security_center/static/10159.phpPatchVendor Advisory
- http://www.osvdb.org/7565
- http://www.securityfocus.com/bid/5724PatchVendor Advisory
FAQ
What is CVE-2002-1476?
CVE-2002-1476 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Buffer overflow in setlocale in libc on NetBSD 1.4.x through 1.6, and possibly other operating systems, when called with the LC_ALL category, allows local attackers to execute arbitrary code via a use...
How severe is CVE-2002-1476?
CVE-2002-1476 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-1476?
Check the references section above for vendor advisories and patch information. Affected products include: Netbsd Netbsd.