Sun Solaris 8.0 Low BandWidth X Proxy DISPLAY memory corruption
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.9 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Sun Solaris 8.0. It has been rated as problematic. This impacts an unknown function of the component Low BandWidth X Proxy. This manipulation of the argument DISPLAY causes memory corruption. This vulnerability appears as CVE-2002-0090. There is no available exploit. Upgrading the affected component is advised.
Details
A vulnerability classified as critical was found in Sun Solaris 8.0 (Operating System). Affected by this vulnerability is an unknown function of the component Low BandWidth X Proxy. The manipulation of the argument DISPLAY with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
Buffer overflow in Low BandWidth X proxy (lbxproxy) in Solaris 8 allows local users to execute arbitrary code via a long display command line option.
The bug was discovered 04/29/2002. The weakness was presented 03/15/2002 by Kevin Kotas as confirmed advisory (CERT.org). It is possible to read the advisory at kb.cert.org. This vulnerability is known as CVE-2002-0090. The exploitation appears to be easy. Attacking locally is a requirement. The exploitation doesn't need any form of authentication. Technical details of the vulnerability are known, but there is no available exploit.
Upgrading eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (8958), SecurityFocus (BID 4633†), OSVDB (8711†) and Vulnerability Center (SBV-20832†). See VDB-17982 and VDB-17981 for similar entries. Be aware that VulDB is the high quality source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Support
- end of life (old version)
Website
- Vendor: https://www.oracle.com/sun/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.3VulDB Meta Temp Score: 8.9
VulDB Base Score: 9.3
VulDB Temp Score: 8.9
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Timeline
03/15/2002 🔍03/15/2002 🔍
03/15/2002 🔍
04/29/2002 🔍
04/29/2002 🔍
02/15/2009 🔍
07/11/2014 🔍
12/15/2024 🔍
Sources
Vendor: oracle.comAdvisory: kb.cert.org
Researcher: Kevin Kotas
Status: Confirmed
CVE: CVE-2002-0090 (🔍)
GCVE (CVE): GCVE-0-2002-0090
GCVE (VulDB): GCVE-100-17983
OVAL: 🔍
CERT: 🔍
X-Force: 8958
SecurityFocus: 4633 - Solaris LBXProxy Display Name Buffer Overflow Vulnerability
OSVDB: 8711 - Sun Solaris OS, Buffer Overflow in LBXProxy Server
Vulnerability Center: 20832 - Sun Solaris 8 Buffer Overflow in Low BandWidth Local Arbitrary Code Execution Vulnerability, High
See also: 🔍
Entry
Created: 07/11/2014 13:42Updated: 12/15/2024 05:53
Changes: 07/11/2014 13:42 (63), 08/27/2019 09:20 (3), 12/15/2024 05:53 (17)
Complete: 🔍
Cache ID: 216:F78:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.