Vulnerability Name: | CVE-2002-1296 (CCN-10717) | ||||||||
Assigned: | 2002-11-27 | ||||||||
Published: | 2002-11-27 | ||||||||
Updated: | 2018-10-30 | ||||||||
Summary: | Directory traversal vulnerability in priocntl system call in Solaris does allows local users to execute arbitrary code via ".." sequences in the pc_clname field of a pcinfo_t structure, which cause priocntl to load a malicious kernel module. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2002-1296 Source: BUGTRAQ Type: UNKNOWN 20021127 Solaris priocntl exploit Source: CCN Type: BugTraq Mailing List, 2002-11-27 3:00:11 Solaris priocntl exploit Source: CCN Type: Sun Alert ID: 49131 Security Vulnerability Involving the priocntl(2) System Call Source: CONFIRM Type: Patch, Vendor Advisory http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fsalert/49131 Source: CCN Type: priocntl(2) Web site priocntl(2) Source: XF Type: Vendor Advisory solaris-priocntl-pcclname-modules(10717) Source: CCN Type: US-CERT VU#683673 Sun Solaris priocntl(2) does not adequately validate path to kernel modules that implement lightweight process (LWP) scheduling policy Source: CERT-VN Type: Patch, Third Party Advisory, US Government Resource VU#683673 Source: CCN Type: OSVDB ID: 8712 Solaris priocntl Arbitrary Kernel Module Loading Source: BID Type: UNKNOWN 6262 Source: CCN Type: BID-6262 Solaris priocntl() System Call Local Root Vulnerability Source: XF Type: UNKNOWN solaris-priocntl-pcclname-modules(10717) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:3637 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |