Vulnerability Name:

CVE-2002-0542 (CCN-8818)

Assigned:2002-04-11
Published:2002-04-11
Updated:2016-10-18
Summary:mail in OpenBSD 2.9 and 3.0 processes a tilde (~) escape character in a message even when it is not in interactive mode, which could allow local users to gain root privileges via calls to mail in cron.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Thu Apr 11 2002 - 06:29:28 CDT
local root compromise in openbsd 3.0 and below

Source: CCN
Type: ZOOM International Security Advisory April 11, 2002
OpenBSD local root compromise

Source: MITRE
Type: CNA
CVE-2002-0542

Source: BUGTRAQ
Type: UNKNOWN
20020411 OpenBSD Local Root Compromise

Source: BUGTRAQ
Type: Exploit, Vendor Advisory
20020411 local root compromise in openbsd 3.0 and below

Source: XF
Type: Patch, Vendor Advisory
openbsd-mail-root-privileges(8818)

Source: CCN
Type: OpenBSD Web site
OpenBSD v. 3.0

Source: CCN
Type: OpenBSD Security Advisory, April 11, 2002
mail(1) will process tilde escapes even in non-interactive mode. This can lead to a root compromise.

Source: CONFIRM
Type: UNKNOWN
http://www.openbsd.org/errata30.html#mail

Source: OSVDB
Type: UNKNOWN
5269

Source: CCN
Type: OSVDB ID: 5269
OpenBSD mail Escape Character Privilege Escalation

Source: BID
Type: Exploit, Patch, Vendor Advisory
4495

Source: CCN
Type: BID-4495
OpenBSD Default Crontab root Compromise Vulnerability

Source: XF
Type: UNKNOWN
openbsd-mail-root-privileges(8818)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:openbsd:openbsd:2.9:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:3.0:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:openbsd:openbsd:3.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    openbsd openbsd 2.9
    openbsd openbsd 3.0
    openbsd openbsd 3.0