Vulnerability Description
Buffer overflow in rpc.cmsd in SCO UnixWare 7.1.1 and Open UNIX 8.0.0 allows remote attackers to execute arbitrary commands via a long parameter to rtable_create (procedure 21).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sco | Open Unix | 8.0.0 |
| Sco | Unixware | 7.1.1 |
References
- ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.12/CSSA-2002-SCO.12.PatchVendor Advisory
- http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-01/0127.htmlExploit
- http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-01/0129.htmlExploit
- http://www.iss.net/security_center/static/8597.phpPatch
- ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.12/CSSA-2002-SCO.12.PatchVendor Advisory
- http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-01/0127.htmlExploit
- http://www.derkeiler.com/Mailing-Lists/securityfocus/bugtraq/2002-01/0129.htmlExploit
- http://www.iss.net/security_center/static/8597.phpPatch
FAQ
What is CVE-2002-1998?
CVE-2002-1998 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in rpc.cmsd in SCO UnixWare 7.1.1 and Open UNIX 8.0.0 allows remote attackers to execute arbitrary commands via a long parameter to rtable_create (procedure 21).
How severe is CVE-2002-1998?
CVE-2002-1998 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2002-1998?
Check the references section above for vendor advisories and patch information. Affected products include: Sco Open Unix, Sco Unixware.