CVE-2002-0971
 
Severity Score
4.6
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the "Add new clients" dialogue box.
Vulnerabilidad en VNC, TightVNC, y TridiaVNC permite a usuarios locales ejecutar código arbitrario como LocalSystem usando el sistema de mensajes de Win32 para evitar el GUI (Interfaz Gráfico de Úsuario) y acceder al cuadro de diálogo "Añadir nuevos clientes"
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2002-08-21 CVE Reserved
- 2002-08-23 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://marc.info/?l=bugtraq&m=102994289123085&w=2 | Mailing List | |
http://www.iss.net/security_center/static/9979.php | Vdb Entry | |
http://www.securityfocus.com/bid/5530 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Att Search vendor "Att" | Winvnc Server Search vendor "Att" for product "Winvnc Server" | <= 3.3.3_r9 Search vendor "Att" for product "Winvnc Server" and version " <= 3.3.3_r9" | - |
Affected
| ||||||
Att Search vendor "Att" | Winvnc Server Search vendor "Att" for product "Winvnc Server" | 3.3.3_r7 Search vendor "Att" for product "Winvnc Server" and version "3.3.3_r7" | - |
Affected
| ||||||
Tightvnc Search vendor "Tightvnc" | Tightvnc Search vendor "Tightvnc" for product "Tightvnc" | 1.2.0 Search vendor "Tightvnc" for product "Tightvnc" and version "1.2.0" | - |
Affected
| ||||||
Tightvnc Search vendor "Tightvnc" | Tightvnc Search vendor "Tightvnc" for product "Tightvnc" | 1.2.1 Search vendor "Tightvnc" for product "Tightvnc" and version "1.2.1" | - |
Affected
| ||||||
Tightvnc Search vendor "Tightvnc" | Tightvnc Search vendor "Tightvnc" for product "Tightvnc" | 1.2.5 Search vendor "Tightvnc" for product "Tightvnc" and version "1.2.5" | - |
Affected
| ||||||
Tridia Search vendor "Tridia" | Tridiavnc Search vendor "Tridia" for product "Tridiavnc" | 1.5 Search vendor "Tridia" for product "Tridiavnc" and version "1.5" | - |
Affected
| ||||||
Tridia Search vendor "Tridia" | Tridiavnc Search vendor "Tridia" for product "Tridiavnc" | 1.5.1 Search vendor "Tridia" for product "Tridiavnc" and version "1.5.1" | - |
Affected
| ||||||
Tridia Search vendor "Tridia" | Tridiavnc Search vendor "Tridia" for product "Tridiavnc" | 1.5.2 Search vendor "Tridia" for product "Tridiavnc" and version "1.5.2" | - |
Affected
| ||||||
Tridia Search vendor "Tridia" | Tridiavnc Search vendor "Tridia" for product "Tridiavnc" | 1.5.4 Search vendor "Tridia" for product "Tridiavnc" and version "1.5.4" | - |
Affected
|