Vulnerability Name: CVE-2002-0391 (CCN-9170) Assigned: 2002-07-31 Published: 2002-07-31 Updated: 2018-10-30 Summary: Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd. CVSS v3 Severity: 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: CALDERA Type: UNKNOWNCSSA-2002-055.0 Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-02:34.rpcSun RPC XDR decoder contains buffer overflow Source: CCN Type: FreeBSD Security Notice FreeBSD-SN-02:05 security issues in ports Source: CCN Type: NetBSD Security Advisory 2002-011Sun RPC XDR decoder contains buffer overflow Source: NETBSD Type: UNKNOWNNetBSD-SA2002-011 Source: CCN Type: SCO Security Advisory CSSA-2002-055.0Linux: RPC XDR buffer overflow Source: CCN Type: SGI Security Advisory 20020801-01-ASun RPC xdr_array vulnerability Source: SGI Type: UNKNOWN20020801-01-A Source: SGI Type: UNKNOWN20020801-01-P Source: AIXAPAR Type: UNKNOWNIY34194 Source: BUGTRAQ Type: UNKNOWN20020803 OpenAFS Security Advisory 2002-001: Remote root vulnerability in OpenAFS servers Source: HP Type: UNKNOWNHPSBUX0209-215 Source: CCN Type: Internet Security Systems Security Advisory, July 31, 2002Remote Buffer Overflow Vulnerability in Sun RPC Source: ISS Type: Vendor Advisory20020731 Remote Buffer Overflow Vulnerability in Sun RPC Source: CCN Type: Compaq SECURITY BULLETIN SRB0039WHP Tru64 UNIX - Potential Buffer Overflows & SSRT2229 Potential Denial of Service Source: MITRE Type: CNACVE-2002-0391 Source: CONECTIVA Type: UNKNOWNCLA-2002:515 Source: CONECTIVA Type: UNKNOWNCLA-2002:535 Source: CCN Type: Conectiva Linux Announcement CLSA-2002:515krb5 -- Integer overflow in Kerberos' remote administration service Source: BUGTRAQ Type: UNKNOWN20020731 Remote Buffer Overflow Vulnerability in Sun RPC Source: BUGTRAQ Type: UNKNOWN20020801 RPC analysis Source: FREEBSD Type: UNKNOWNFreeBSD-SA-02:34.rpc Source: BUGTRAQ Type: UNKNOWN20020802 MITKRB5-SA-2002-001: Remote root vulnerability in MIT krb5 admin Source: BUGTRAQ Type: UNKNOWN20020909 GLSA: glibc Source: HP Type: UNKNOWNHPSBTL0208-061 Source: BUGTRAQ Type: UNKNOWN20020802 kerberos rpc xdr_array Source: CCN Type: RHSA-2002-166Updated glibc packages fix vulnerabilities in RPC XDR decoder Source: REDHAT Type: UNKNOWNRHSA-2002:166 Source: CCN Type: RHSA-2002-167glibc security update Source: CCN Type: RHSA-2002-172Updated krb5 packages fix remote buffer overflow Source: REDHAT Type: UNKNOWNRHSA-2002:172 Source: CCN Type: RHSA-2002-173krb5 security update Source: CCN Type: RHSA-2003-168Updated kerberos packages fix various vulnerabilities Source: CCN Type: RHSA-2003-212Updated glibc packages fix vulnerabilities Source: CCN Type: Sun Microsystems Web siteSunSolve Online Source: CCN Type: Sun Alert ID: 46122Security Vulnerability in the Network Services Library, libnsl(3LIB) Source: CCN Type: MIT krb5 Security Advisory 2002-001Remote root vulnerability in MIT krb5 admin system Source: CCN Type: CERT Advisory CA-2002-25Integer Overflow In XDR Library Source: CERT Type: Patch, Third Party Advisory, US Government ResourceCA-2002-25 Source: CCN Type: CIAC Information Bulletin M-111Integer Overflow in External Data Representation (XDR) Library Source: DEBIAN Type: UNKNOWNDSA-142 Source: DEBIAN Type: UNKNOWNDSA-143 Source: DEBIAN Type: UNKNOWNDSA-146 Source: DEBIAN Type: UNKNOWNDSA-149 Source: DEBIAN Type: UNKNOWNDSA-333 Source: DEBIAN Type: DSA-142openafs -- integer overflow Source: DEBIAN Type: DSA-143krb5 -- integer overflow Source: DEBIAN Type: DSA-146dietlibc -- integer overflow Source: DEBIAN Type: DSA-149glibc -- integer overflow Source: DEBIAN Type: DSA-333acm -- integer overflow Source: CCN Type: Apple Computer, Inc. Product Security Incident ResponseSecurity Update 2002-08-02 Source: XF Type: UNKNOWNsunrpc-xdr-array-bo(9170) Source: CCN Type: US-CERT VU#192995Integer overflow in xdr_array() function when deserializing the XDR stream Source: CERT-VN Type: US Government ResourceVU#192995 Source: ENGARDE Type: UNKNOWNESA-20021003-021 Source: CCN Type: Trustix Secure Linux Security Advisory #2002-0067glibc Source: CCN Type: Gentoo Linux Security Announcement 2002-09-05 11:00 UTCinteger overflow Source: CCN Type: Gentoo Linux Security Announcement 2002-09-27 10:00 UTCglibc Source: CCN Type: EnGarde Secure Linux Security Advisory ESA-20021003-021several security-related updates. Source: MANDRAKE Type: UNKNOWNMDKSA-2002:057 Source: CCN Type: Microsoft Security Bulletin MS02-057Flaw in Services for Unix 3.0 Interix SDK Could Allow Code Execution (Q329209) Source: CCN Type: OpenAFS Security Advisory 2002-001Remote root vulnerability in OpenAFS servers Source: CCN Type: OpenBSD 3.1 errata012: SECURITY FIX: July 29, 2002 Source: REDHAT Type: UNKNOWNRHSA-2002:167 Source: REDHAT Type: UNKNOWNRHSA-2002:173 Source: REDHAT Type: UNKNOWNRHSA-2003:168 Source: REDHAT Type: UNKNOWNRHSA-2003:212 Source: BID Type: UNKNOWN5356 Source: CCN Type: BID-5356Multiple Vendor Sun RPC xdr_array Buffer Overflow Vulnerability Source: MS Type: UNKNOWNMS02-057 Source: XF Type: UNKNOWNsunrpc-xdr-array-bo(9170) Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:42 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:4728 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:9 Vulnerable Configuration: Configuration 1 :cpe:/o:freebsd:freebsd:*:release_p5:*:*:*:*:*:* (Version <= 4.6.1)OR cpe:/o:openbsd:openbsd:3.1:*:*:*:*:*:*:* OR cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:* OR cpe:/o:sun:solaris:9.0:*:sparc:*:*:*:*:* OR cpe:/o:sun:sunos:5.5.1:*:*:*:*:*:*:* OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:* OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/o:sun:sunos:5.5.1:*:*:*:*:*:*:* OR cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:* OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:* OR cpe:/o:sun:sunos:5.9:*:*:*:*:*:*:* OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:* AND cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:* OR cpe:/o:compaq:tru64:4.0f:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.04:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:* OR cpe:/o:freebsd:ports_collection:*:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.4:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.5:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:10.24:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.0:*:*:*:*:*:*:* OR cpe:/o:compaq:tru64:4.0g:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:* OR cpe:/o:compaq:tru64:5.0a:*:*:*:*:*:*:* OR cpe:/o:compaq:tru64:5.1:*:*:*:*:*:*:* OR cpe:/o:compaq:tru64:5.1a:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:* OR cpe:/o:engardelinux:secure_linux:-:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_email_server:iii:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:* OR cpe:/o:novell:suse_linux_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.6:beta:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:* OR cpe:/a:microsoft:windows_services_for_unix:3.0:*:*:*:*:*:*:* OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:* OR cpe:/o:netbsd:netbsd:current:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/a:mit:kerberos:*:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:pseries:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:iseries:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
freebsd freebsd * release_p5
openbsd openbsd 3.1
sun solaris 2.6
sun solaris 9.0
sun sunos 5.5.1
sun sunos 5.7
sun sunos 5.8
sun solaris 2.5.1
sun solaris 2.6
hp hp-ux 10.20
sun solaris 8
sun solaris 9
sun solaris 7.0
hp hp-ux 11.00
compaq tru64 4.0f
netbsd netbsd 1.4.1
redhat linux 6.2
hp hp-ux 11.04
debian debian linux 2.2
netbsd netbsd 1.4.2
mandrakesoft mandrake linux 7.1
freebsd ports collection *
redhat linux 7
netbsd netbsd 1.4
hp hp-ux 11.11
mandrakesoft mandrake linux 7.2
netbsd netbsd 1.5
hp hp-ux 10.24
suse suse linux 7.0
compaq tru64 4.0g
mandrakesoft mandrake linux corporate server 1.0.1
suse suse linux 7.1
redhat linux 7.1
mandrakesoft mandrake linux 8.0
suse suse linux 7.2
netbsd netbsd 1.4.3
netbsd netbsd 1.5.1
compaq tru64 5.0a
compaq tru64 5.1
compaq tru64 5.1a
mandrakesoft mandrake linux 8.1
redhat linux 7.2
suse suse linux 7.3
netbsd netbsd 1.5.2
engardelinux secure linux -
suse suse linux firewall *
suse suse linux database server *
suse suse email server iii
suse suse linux connectivity server *
mandrakesoft mandrake linux 8.2
suse suse linux 8.0
conectiva linux 8.0
redhat linux 7.3
debian debian linux 3.0
novell suse linux enterprise server *
netbsd netbsd 1.6 beta
gentoo linux *
suse suse linux office server *
netbsd netbsd 1.5.3
microsoft windows services for unix 3.0
hp hp-ux 11.22
netbsd netbsd current
redhat enterprise linux 2.1
mit kerberos *
redhat linux 7.1
redhat linux 7.1
mandrakesoft mandrake linux 8.0
mandrakesoft mandrake linux 8.1
mandrakesoft mandrake linux 8.2