Vulnerabilities > CVE-2002-0033 - Unspecified vulnerability in SUN Solaris and Sunos
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Heap-based buffer overflow in cfsd_calloc function of Solaris cachefsd allows remote attackers to execute arbitrary code via a request with a long directory and cache name.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 8 |
Exploit-Db
description | Solaris 2/7/8/9 cachefsd Heap Overflow Vulnerability. CVE-2002-0033. Remote exploit for solaris platform |
id | EDB-ID:21437 |
last seen | 2016-02-02 |
modified | 2002-01-01 |
published | 2002-01-01 |
reporter | Last Stage of Delirium |
source | https://www.exploit-db.com/download/21437/ |
title | Solaris 2/7/8/9 cachefsd Heap Overflow Vulnerability |
Nessus
NASL family | Gain a shell remotely |
NASL id | CACHEFSD_OVERFLOW.NASL |
description | The cachefsd RPC service is running on the remote host. It is, therefore, potentially affected by the following vulnerabilities : - A heap-based buffer overflow condition exists in the cfsd_calloc() function that allows an unauthenticated, remote attacker to execute arbitrary code via a long directory and cache name. (CVE-2002-0033 / ESCROWUPGRADE) - A heap-based buffer overflow condition exists in the fscache_setup() function that allows a local attacker to gain root privileges via a long mount argument. (CVE-2002-0084) ESCROWUPGRADE is one of multiple Equation Group vulnerabilities and exploits disclosed on 2017/04/08 by a group known as the Shadow Brokers. Note that Nessus has not attempted to exploit these issues but has instead only detected that the service is running. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 10951 |
published | 2002-05-08 |
reporter | This script is Copyright (C) 2002-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/10951 |
title | Solaris cachefsd Multiple Vulnerabilities (ESCROWUPGRADE) |
code |
|
Oval
accepted 2010-09-20T04:00:10.335-04:00 class vulnerability contributors name David Proulx organization The MITRE Corporation name Brian Soby organization The MITRE Corporation name Todd Dolinsky organization Opsware, Inc. name Jonathan Baker organization The MITRE Corporation
description Heap-based buffer overflow in cfsd_calloc function of Solaris cachefsd allows remote attackers to execute arbitrary code via a request with a long directory and cache name. family unix id oval:org.mitre.oval:def:124 status accepted submitted 2002-10-17T12:00:00.000-04:00 title Solaris 7 cachefsd Heap Overflow Vulnerability version 37 accepted 2010-09-20T04:00:21.410-04:00 class vulnerability contributors name David Proulx organization The MITRE Corporation name Brian Soby organization The MITRE Corporation name Todd Dolinsky organization Opsware, Inc. name Jonathan Baker organization The MITRE Corporation
description Heap-based buffer overflow in cfsd_calloc function of Solaris cachefsd allows remote attackers to execute arbitrary code via a request with a long directory and cache name. family unix id oval:org.mitre.oval:def:31 status accepted submitted 2003-01-31T12:00:00.000-04:00 title Solaris 8/9 cachefsd Heap Overflow Vulnerability version 38
Saint
bid | 4674 |
description | cachefsd heap overflow |
id | rpc_cachefsd |
osvdb | 779 |
title | solaris_cachefsd |
type | remote |
References
- http://archives.neohapsis.com/archives/bugtraq/2002-05/0026.html
- http://archives.neohapsis.com/archives/bugtraq/2002-05/0026.html
- http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F44309
- http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F44309
- http://www.cert.org/advisories/CA-2002-11.html
- http://www.cert.org/advisories/CA-2002-11.html
- http://www.iss.net/security_center/static/8999.php
- http://www.iss.net/security_center/static/8999.php
- http://www.kb.cert.org/vuls/id/635811
- http://www.kb.cert.org/vuls/id/635811
- http://www.securityfocus.com/bid/4674
- http://www.securityfocus.com/bid/4674
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A124
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A124
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A31
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A31