Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2002-1347 | First vendor Publication | 2002-12-18 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | |||
---|---|---|---|
Overall CVSS Score | 9.8 | ||
Base Score | 9.8 | Environmental Score | 9.8 |
impact SubScore | 5.9 | Temporal Score | 9.8 |
Exploitabality Sub Score | 3.9 | ||
Attack Vector | Network | Attack Complexity | Low |
Privileges Required | None | User Interaction | None |
Scope | Unchanged | Confidentiality Impact | High |
Integrity Impact | High | Availability Impact | High |
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple buffer overflows in Cyrus SASL library 2.1.9 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long inputs during user name canonicalization, (2) characters that need to be escaped during LDAP authentication using saslauthd, or (3) an off-by-one error in the log writer, which does not allocate space for the null character that terminates a string. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1347 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-47 | Buffer Overflow via Parameter Expansion |
CAPEC-100 | Overflow Buffers |
CAPEC-123 | Buffer Attacks |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-131 | Incorrect Calculation of Buffer Size (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-04 | Name : FreeBSD Ports: cyrus File : nvt/freebsd_cyrus.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 215-1 (cyrus-imapd) File : nvt/deb_215_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
10657 | Cyrus SASL Library Log Writer Overflow |
10656 | Cyrus SASL Library LDAP saslauthd Authentication Overflow |
10655 | Cyrus SASL Library User Name Canonicalization Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-03-21 | Name : The remote host is missing a Mac OS X update that fixes a security issue. File : macosx_SecUpd2005-003.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-215.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:44 |
|
2024-11-28 12:05:14 |
|
2024-02-02 09:28:20 |
|
2021-05-05 01:01:21 |
|
2021-04-22 01:01:55 |
|
2020-05-24 01:01:12 |
|
2020-05-23 00:15:07 |
|
2017-07-11 12:01:11 |
|
2016-10-18 12:01:05 |
|
2016-04-26 12:17:41 |
|
2014-02-17 10:25:17 |
|
2013-05-11 12:12:33 |
|