Vulnerability Name: | CVE-2002-1215 (CCN-10357) | ||||||||
Assigned: | 2002-10-14 | ||||||||
Published: | 2002-10-14 | ||||||||
Updated: | 2008-09-10 | ||||||||
Summary: | Multiple format string vulnerabilities in heartbeat 0.4.9 and earlier (claimed as buffer overflows in some sources) allow remote attackers to execute arbitrary code via certain packets to UDP port 694 (incorrectly claimed as TCP in some sources). | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2002-1215 Source: CONECTIVA Type: UNKNOWN CLA-2002:540 Source: CCN Type: Conectiva Linux Announcement CLSA-2002:540 Remote format string vulnerability Source: CCN Type: Linux-HA Web site Heartbeat home page Source: CCN Type: Linux-HA Security Announcement 14 October, 2002 Fixed a serious potential remote root vulnerability Source: CONFIRM Type: UNKNOWN http://linux-ha.org/security/sec01.txt Source: DEBIAN Type: Patch, Vendor Advisory DSA-174 Source: DEBIAN Type: DSA-174 heartbeat -- buffer overflow Source: XF Type: Vendor Advisory linuxha-heartbeat-bo(10357) Source: SUSE Type: UNKNOWN SuSE-SA:2002:037 Source: CCN Type: OSVDB ID: 14512 heartbeat Multiple Unspecified Remote Format Strings Source: BID Type: Patch, Vendor Advisory 5955 Source: CCN Type: BID-5955 Linux-HA Heartbeat Remote Buffer Overflow Vulnerability Source: XF Type: UNKNOWN linuxha-heartbeat-bo(10357) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |