Executive Summary

Informations
Name CVE-2002-0829 First vendor Publication 2002-08-12
Vendor Cve Last vendor Modification 2016-10-18

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 4.6 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Integer overflow in the Berkeley Fast File System (FFS) in FreeBSD 4.6.1 RELEASE-p4 and earlier allows local users to access arbitrary file contents within FFS to gain privileges by creating a file that is larger than allowed by the virtual memory system.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0829

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 80

Open Source Vulnerability Database (OSVDB)

Id Description
5073 Berkeley FFS Large File Integer Overflow

A local overflow exists in Berkley Fast File System. FFS fails to properly calculate file sizes resulting in a integer overflow. With a specially created file larger than what the VM system can handle, an attacker may gain access to arbitrary filesystem blocks, reading or corrupting data, which may potentially lead to arbitrary code execution, resulting in a loss of integrity, and/or availability.

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/5399
FREEBSD http://marc.info/?l=bugtraq&m=102865404413458&w=2
OSVDB http://www.osvdb.org/5073
XF http://www.iss.net/security_center/static/9771.php

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Date Informations
2024-02-02 01:02:01
  • Multiple Updates
2024-02-01 12:01:22
  • Multiple Updates
2023-09-05 12:01:56
  • Multiple Updates
2023-09-05 01:01:13
  • Multiple Updates
2023-09-02 12:01:57
  • Multiple Updates
2023-09-02 01:01:13
  • Multiple Updates
2023-08-12 12:02:19
  • Multiple Updates
2023-08-12 01:01:13
  • Multiple Updates
2023-08-11 12:02:01
  • Multiple Updates
2023-08-11 01:01:14
  • Multiple Updates
2023-08-06 12:01:52
  • Multiple Updates
2023-08-06 01:01:14
  • Multiple Updates
2023-08-04 12:01:56
  • Multiple Updates
2023-08-04 01:01:14
  • Multiple Updates
2023-07-14 12:01:54
  • Multiple Updates
2023-07-14 01:01:14
  • Multiple Updates
2023-03-29 01:01:53
  • Multiple Updates
2023-03-28 12:01:19
  • Multiple Updates
2022-12-15 01:01:45
  • Multiple Updates
2022-10-11 12:01:42
  • Multiple Updates
2022-10-11 01:01:07
  • Multiple Updates
2021-05-05 01:01:19
  • Multiple Updates
2021-05-04 12:01:43
  • Multiple Updates
2021-04-22 01:01:51
  • Multiple Updates
2020-05-23 01:35:51
  • Multiple Updates
2020-05-23 00:15:02
  • Multiple Updates
2019-03-21 01:01:01
  • Multiple Updates
2019-03-19 12:01:31
  • Multiple Updates
2017-03-30 12:00:45
  • Multiple Updates
2016-10-18 12:01:02
  • Multiple Updates
2016-06-28 14:59:29
  • Multiple Updates
2016-04-26 12:12:57
  • Multiple Updates
2013-05-11 12:10:46
  • Multiple Updates