Vulnerability Name:
CVE-2002-1914 (CCN-9632)
Assigned:
2002-07-17
Published:
2002-07-17
Updated:
2008-09-05
Summary:
dump 0.4 b10 through b29 allows local users to cause a denial of service (execution prevention) by using flock() to lock the /etc/dumpdates file.
CVSS v3 Severity:
4.0 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
None
Availibility (A):
Low
CVSS v2 Severity:
2.1 Low
(CVSS v2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
None
Availibility (A):
Partial
2.1 Low
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
None
Availibility (A):
Partial
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Denial of Service
References:
Source: CCN
Type: BugTraq Mailing List, Wed Jul 17 2002 - 12:31:10 CDT
asciiSECURE advisory (2002-07-17/1)
Source: MITRE
Type: CNA
CVE-2002-1914
Source: BUGTRAQ
Type: UNKNOWN
20020717 asciiSECURE advisory (2002-07-17/1)
Source: CCN
Type: RHSA-2005-583
dump security update
Source: CCN
Type: SA21520
Avaya Products Multiple Vulnerabilities
Source: SECUNIA
Type: UNKNOWN
21520
Source: CONFIRM
Type: UNKNOWN
http://support.avaya.com/elmodocs2/security/ASA-2006-156.htm
Source: CCN
Type: ASA-2006-156
dump security update
Source: XF
Type: UNKNOWN
dump-flock-dumpdates-dos(9632)
Source: REDHAT
Type: UNKNOWN
RHSA-2005:583
Source: BID
Type: UNKNOWN
5264
Source: CCN
Type: BID-5264
Multiple Vendor Dump File Locking Denial Of Service Vulnerability
Source: XF
Type: UNKNOWN
dump-flock-dumpdates-dos(9632)
Vulnerable Configuration:
Configuration 1
:
cpe:/a:dump:dump:0.4_b10:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b11:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b12:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b13:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b14:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b15:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b16:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b17:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b18:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b19:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b20:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b21:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b22:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b23:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b24:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b25:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b26:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b27:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b28:*:*:*:*:*:*:*
OR
cpe:/a:dump:dump:0.4_b29:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:*
OR
cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*
OR
cpe:/o:netbsd:netbsd:*:*:*:*:*:*:*:*
OR
cpe:/o:openbsd:openbsd:*:*:*:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
OR
cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
OR
cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
Denotes that component is vulnerable
BACK
dump
dump 0.4_b10
dump
dump 0.4_b11
dump
dump 0.4_b12
dump
dump 0.4_b13
dump
dump 0.4_b14
dump
dump 0.4_b15
dump
dump 0.4_b16
dump
dump 0.4_b17
dump
dump 0.4_b18
dump
dump 0.4_b19
dump
dump 0.4_b20
dump
dump 0.4_b21
dump
dump 0.4_b22
dump
dump 0.4_b23
dump
dump 0.4_b24
dump
dump 0.4_b25
dump
dump 0.4_b26
dump
dump 0.4_b27
dump
dump 0.4_b28
dump
dump 0.4_b29
linux
linux kernel *
freebsd
freebsd *
netbsd
netbsd *
openbsd
openbsd *
redhat
enterprise linux 2.1
redhat
enterprise linux 2.1
redhat
enterprise linux 2.1
redhat
linux advanced workstation 2.1