Vulnerability Name:

CVE-2002-0143 (CCN-7896)

Assigned:2002-01-13
Published:2002-01-13
Updated:2008-09-11
Summary:Buffer overflow in Eterm of Enlightenment Imlib2 1.0.4 and earlier allows local users to execute arbitrary code via a long HOME environment variable.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Sun Jan 13 2002 - 08:57:57 CST
Eterm SGID utmp Buffer Overflow (Local)

Source: CCN
Type: BugTraq Mailing List, Mon Jan 21 2002 - 13:24:37 CST
Re: Eterm SGID utmp Buffer Overflow (Local)

Source: MITRE
Type: CNA
CVE-2002-0143

Source: BUGTRAQ
Type: Vendor Advisory
20020113 Eterm SGID utmp Buffer Overflow (Local)

Source: BUGTRAQ
Type: Vendor Advisory
20020121 Re: Eterm SGID utmp Buffer Overflow (Local)

Source: CCN
Type: Eterm Web site
Eterm.Org

Source: XF
Type: Vendor Advisory
eterm-home-bo(7896)

Source: CCN
Type: OSVDB ID: 2023
Eterm Home Environment Variable Local Overflow

Source: BID
Type: UNKNOWN
3868

Source: CCN
Type: BID-3868
IMLib2 Home Environment Variable Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
eterm-home-bo(7896)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:enlightenment:imlib:2.0.01.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:enlightenment:imlib:2.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:enlightenment:imlib:2.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:enlightenment:imlib:2.1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:enlightenment:imlib:2.1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:michael_jennings:eterm:0.9.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:michael_jennings:eterm:0.9.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    enlightenment imlib 2.0.01.0.0
    enlightenment imlib 2.1.0.1
    enlightenment imlib 2.1.0.2
    enlightenment imlib 2.1.0.3
    enlightenment imlib 2.1.0.4
    michael_jennings eterm 0.9.1
    michael_jennings eterm 0.9.1