Vulnerability Name:

CVE-2002-1247 (CCN-10592)

Assigned:2002-11-11
Published:2002-11-11
Updated:2016-10-18
Summary:Buffer overflow in LISa allows local users to gain access to a raw socket via a long LOGNAME environment variable for the resLISa daemon.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Gentoo Linux Security Announcement 200211-004
rlogin.protocol and telnet.protocol URL KIO Vulnerability resLISa / LISa Vulnerabilities

Source: VULNWATCH
Type: UNKNOWN
20021111 iDEFENSE Security Advisory 11.11.02: Buffer Overflow in KDE resLISa

Source: MITRE
Type: CNA
CVE-2002-1247

Source: CCN
Type: LISa Web site
LISa - LAN Information Server

Source: BUGTRAQ
Type: UNKNOWN
20021111 iDEFENSE Security Advisory 11.11.02: Buffer Overflow in KDE resLISa

Source: BUGTRAQ
Type: UNKNOWN
20021112 KDE Security Advisory: resLISa / LISa Vulnerabilities

Source: BUGTRAQ
Type: UNKNOWN
20021114 GLSA: kdelibs

Source: CCN
Type: RHSA-2002-220
Updated KDE packages fix security issues

Source: CCN
Type: RHSA-2002-221
kdelibs security update

Source: CCN
Type: CIAC Information Bulletin N-020
Red Hat Multiple Vulnerabilities in KDE

Source: CIAC
Type: UNKNOWN
N-020

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-193

Source: DEBIAN
Type: DSA-193
kdenetwork -- buffer overflow

Source: MISC
Type: UNKNOWN
http://www.idefense.com/advisory/11.11.02.txt

Source: XF
Type: Vendor Advisory
kde-kdenetwork-reslisa-bo(10592)

Source: CCN
Type: KDE Web site
Getting KDE

Source: CCN
Type: KDE Security Advisory 2002-11-11
resLISa / LISa Vulnerabilities

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2002:080

Source: REDHAT
Type: UNKNOWN
RHSA-2002:220

Source: BID
Type: Patch, Vendor Advisory
6157

Source: CCN
Type: BID-6157
KDE Network RESLISA LOGNAME Local Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
kde-kdenetwork-reslisa-bo(10592)

Source: CCN
Type: iDEFENSE Security Advisory 11.11.02
Buffer Overflow in KDE resLISa

Vulnerable Configuration:Configuration 1:
  • cpe:/a:kde:klisa:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:lisa:lisa:0.1:*:*:*:*:*:*:*
  • OR cpe:/a:lisa:lisa:0.1.2:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:kde:kde:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.3a:*:*:*:*:*:*:*
  • OR cpe:/o:kde:kde:3.0.4:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:193
    V
    buffer overflow
    2002-11-11
    BACK
    kde klisa 2.2.2
    lisa lisa 0.1
    lisa lisa 0.1.2
    kde kde 2.0
    kde kde 2.1
    kde kde 2.2
    kde kde 3.0
    kde kde 3.0.1
    kde kde 3.0.2
    kde kde 3.0.3
    kde kde 3.0.3a
    kde kde 3.0.4
    redhat linux 7.2
    redhat linux 7.3
    debian debian linux 3.0
    gentoo linux *
    redhat linux 8.0
    mandrakesoft mandrake linux 9.0
    redhat enterprise linux 2.1