CVE-2002-1420
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/04/2003
Last modified:
03/04/2025
Description
Integer signedness error in select() on OpenBSD 3.1 and earlier allows local users to overwrite arbitrary kernel memory via a negative value for the size parameter, which satisfies the boundary check as a signed integer, but is later used as an unsigned integer during a data copying operation.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=bugtraq&m=102918817012863&w=2
- http://www.iss.net/security_center/static/9809.php
- http://www.kb.cert.org/vuls/id/259787
- http://www.osvdb.org/7554
- http://www.securityfocus.com/bid/5442
- http://marc.info/?l=bugtraq&m=102918817012863&w=2
- http://www.iss.net/security_center/static/9809.php
- http://www.kb.cert.org/vuls/id/259787
- http://www.osvdb.org/7554
- http://www.securityfocus.com/bid/5442