CVE-2002-0677
https://notcve.org/view.php?id=CVE-2002-0677
CDE ToolTalk database server (ttdbserver) allows remote attackers to overwrite arbitrary memory locations with a zero, and possibly gain privileges, via a file descriptor argument in an AUTH_UNIX procedure call, which is used as a table index by the _TT_ISCLOSE procedure. El sevidor de bases de datos CDE ToolTalk (ttdbserver) permite a atacantes remotos sobrescribir posiciones arbitrarias de memoria con ceros, y posiblemente ganar privilegios, mediante un arguemnte de descriptor de fichero en una llamada al procedimiento AUTH_UNIX, que es usado como índice de tabla en el procedimiento _TT_ISCLOSE. • ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.28/CSSA-2002-SCO.28.txt ftp://patches.sgi.com/support/free/security/advisories/20021102-02-P http://marc.info/?l=bugtraq&m=102635906423617&w=2 http://www.cert.org/advisories/CA-2002-20.html http://www.kb.cert.org/vuls/id/975403 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1099 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15 https:/ •
CVE-2002-0573
https://notcve.org/view.php?id=CVE-2002-0573
Format string vulnerability in RPC wall daemon (rpc.rwalld) for Solaris 2.5.1 through 8 allows remote attackers to execute arbitrary code via format strings in a message that is not properly provided to the syslog function when the wall command cannot be executed. • http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0049.html http://online.securityfocus.com/archive/1/270268 http://www.cert.org/advisories/CA-2002-10.html http://www.iss.net/security_center/static/8971.php http://www.kb.cert.org/vuls/id/638099 http://www.osvdb.org/778 http://www.securityfocus.com/bid/4639 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A41 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre •
CVE-2002-0436 – Solaris 7.0/8 Sunsolve CD - SSCD_SunCourier.pl CGI Script Arbitrary Command Execution
https://notcve.org/view.php?id=CVE-2002-0436
sscd_suncourier.pl CGI script in the Sun Sunsolve CD pack allows remote attackers to execute arbitrary commands via shell metacharacters in the email address parameter. • https://www.exploit-db.com/exploits/21340 http://www.iss.net/security_center/static/8435.php http://www.securityfocus.com/archive/1/261544 http://www.securityfocus.com/bid/4269 •
CVE-2002-0572 – Apple Mac OSX 10.x / FreeBSD 4.x / OpenBSD 2.x / Solaris 2.5/2.6/7.0/8 - 'exec C Library' Standard I/O File Descriptor Closure
https://notcve.org/view.php?id=CVE-2002-0572
FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files. • https://www.exploit-db.com/exploits/21407 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:23.stdio.asc http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0033.html http://online.securityfocus.com/archive/1/268970 http://online.securityfocus.com/archive/1/269102 http://www.ciac.org/ciac/bulletins/m-072.shtml http://www.iss.net/security_center/static/8920.php http://www.kb.cert.org/vuls/id/809347 http://www.osvdb.org/6095 http://www.secu •
CVE-2002-0033 – Solaris 2/7/8/9 cachefsd - Remote Heap Overflow
https://notcve.org/view.php?id=CVE-2002-0033
Heap-based buffer overflow in cfsd_calloc function of Solaris cachefsd allows remote attackers to execute arbitrary code via a request with a long directory and cache name. Desbordamiento de montón (heap) en la función cfsd_calloc de Solaris cachefsd permite a atacantes remotos ejecutar código arbitrario mediante una petición con nombres de directorio y de caché largos. • https://www.exploit-db.com/exploits/21437 http://archives.neohapsis.com/archives/bugtraq/2002-05/0026.html http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F44309 http://www.cert.org/advisories/CA-2002-11.html http://www.iss.net/security_center/static/8999.php http://www.kb.cert.org/vuls/id/635811 http://www.securityfocus.com/bid/4674 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A124 https://oval.cisecurity.org/repository/ •