cve-2002-0004
Vulnerability from cvelistv5
Published
2002-06-25 04:00
Modified
2024-08-08 02:35
Severity ?
EPSS score ?
0.27% (0.48069)
Summary
Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-08T02:35:17.414Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "linux-at-exetime-heap-corruption(7909)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7909",
               },
               {
                  name: "HPSBTL0302-034",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://online.securityfocus.com/advisories/3969",
               },
               {
                  name: "DSA-102",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2002/dsa-102",
               },
               {
                  name: "RHSA-2002:015",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://www.redhat.com/support/errata/RHSA-2002-015.html",
               },
               {
                  name: "HPSBTL0201-021",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_HP",
                     "x_transferred",
                  ],
                  url: "http://online.securityfocus.com/advisories/3833",
               },
               {
                  name: "20020117 '/usr/bin/at 31337 + vuln' problem + exploit",
                  tags: [
                     "mailing-list",
                     "x_refsource_BUGTRAQ",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=101128661602088&w=2",
               },
               {
                  name: "3886",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/3886",
               },
               {
                  name: "SuSE-SA:2002:003",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://www.novell.com/linux/security/advisories/2002_003_at_txt.html",
               },
               {
                  name: "MDKSA-2002:007",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_MANDRAKE",
                     "x_transferred",
                  ],
                  url: "http://marc.info/?l=bugtraq&m=101147632721031&w=2",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2002-01-17T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Heap corruption vulnerability in the \"at\" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2002-06-16T00:00:00",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "linux-at-exetime-heap-corruption(7909)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7909",
            },
            {
               name: "HPSBTL0302-034",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://online.securityfocus.com/advisories/3969",
            },
            {
               name: "DSA-102",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2002/dsa-102",
            },
            {
               name: "RHSA-2002:015",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://www.redhat.com/support/errata/RHSA-2002-015.html",
            },
            {
               name: "HPSBTL0201-021",
               tags: [
                  "vendor-advisory",
                  "x_refsource_HP",
               ],
               url: "http://online.securityfocus.com/advisories/3833",
            },
            {
               name: "20020117 '/usr/bin/at 31337 + vuln' problem + exploit",
               tags: [
                  "mailing-list",
                  "x_refsource_BUGTRAQ",
               ],
               url: "http://marc.info/?l=bugtraq&m=101128661602088&w=2",
            },
            {
               name: "3886",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/3886",
            },
            {
               name: "SuSE-SA:2002:003",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://www.novell.com/linux/security/advisories/2002_003_at_txt.html",
            },
            {
               name: "MDKSA-2002:007",
               tags: [
                  "vendor-advisory",
                  "x_refsource_MANDRAKE",
               ],
               url: "http://marc.info/?l=bugtraq&m=101147632721031&w=2",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2002-0004",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Heap corruption vulnerability in the \"at\" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "linux-at-exetime-heap-corruption(7909)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/7909",
                  },
                  {
                     name: "HPSBTL0302-034",
                     refsource: "HP",
                     url: "http://online.securityfocus.com/advisories/3969",
                  },
                  {
                     name: "DSA-102",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2002/dsa-102",
                  },
                  {
                     name: "RHSA-2002:015",
                     refsource: "REDHAT",
                     url: "http://www.redhat.com/support/errata/RHSA-2002-015.html",
                  },
                  {
                     name: "HPSBTL0201-021",
                     refsource: "HP",
                     url: "http://online.securityfocus.com/advisories/3833",
                  },
                  {
                     name: "20020117 '/usr/bin/at 31337 + vuln' problem + exploit",
                     refsource: "BUGTRAQ",
                     url: "http://marc.info/?l=bugtraq&m=101128661602088&w=2",
                  },
                  {
                     name: "3886",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/3886",
                  },
                  {
                     name: "SuSE-SA:2002:003",
                     refsource: "SUSE",
                     url: "http://www.novell.com/linux/security/advisories/2002_003_at_txt.html",
                  },
                  {
                     name: "MDKSA-2002:007",
                     refsource: "MANDRAKE",
                     url: "http://marc.info/?l=bugtraq&m=101147632721031&w=2",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2002-0004",
      datePublished: "2002-06-25T04:00:00",
      dateReserved: "2002-01-02T00:00:00",
      dateUpdated: "2024-08-08T02:35:17.414Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2002-0004\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-02-27T05:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap corruption vulnerability in the \\\"at\\\" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.\"},{\"lang\":\"es\",\"value\":\"Corrupción de memoria en el comando \\\"at\\\" permite que usuarios locales ejecuten código arbitrario haciendo uso de un tiempo de ejecución mal escrito (lo que provoca que at libere la misma memoria dos veces).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:caldera:openlinux_server:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A218B67-B87B-4A5E-B9EF-EF39ADEAD9FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:caldera:openlinux_workstation:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB41DE44-C3A1-4CC9-ACA7-4EC171D68910\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:2.2:*:68k:*:*:*:*:*\",\"matchCriteriaId\":\"E040A866-0D2C-40E1-B1FB-DB600B389E27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:*\",\"matchCriteriaId\":\"CE1C944A-E5F1-49DE-B069-2A358123B535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:2.2:*:arm:*:*:*:*:*\",\"matchCriteriaId\":\"D71083B4-1736-4501-8DE8-BC24AC1447AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:2.2:*:ia-32:*:*:*:*:*\",\"matchCriteriaId\":\"E9D468DB-C4AE-4ACB-B3B7-2FAEA90D6A49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:2.2:*:powerpc:*:*:*:*:*\",\"matchCriteriaId\":\"2A32E486-2598-41B3-B6DB-3CC46D239AFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"AAEE18D8-AA3B-47A3-AA7C-AAFF7591F391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE1E3D8-2BB1-4FFA-9BC9-7AF347D26190\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF49BF03-C25E-4737-84D5-892895C86C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2019E0E-426B-43AF-8904-1B811AE171E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55C5FC1A-1253-4390-A4FC-573BB14EA937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4371A667-18E1-4C54-B2E1-6F885F22F213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*\",\"matchCriteriaId\":\"5B28763D-8F4B-45E5-82FA-AB7E54C18EBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"205EF72B-7334-4AE0-9CA6-D2E8E5910C8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:*\",\"matchCriteriaId\":\"613A22EC-D93C-48B0-B97C-3E0DDFBD0B62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*\",\"matchCriteriaId\":\"344610A8-DB6D-4407-9304-916C419F648C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"B7EC2B95-4715-4EC9-A10A-2542501F8A61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"64775BEF-2E53-43CA-8639-A7E54F6F4222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.0:*:alpha:*:*:*:*:*\",\"matchCriteriaId\":\"FD6576E2-9F26-4857-9F28-F51899F1EF48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.0:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"4DC9842D-E23B-4B9F-A7BF-57C3BA3DE398\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.1:*:alpha:*:*:*:*:*\",\"matchCriteriaId\":\"7F3FAAB3-7A8A-42E5-9DCE-E4A843CED1B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.1:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"C8783A6D-DFD8-45DD-BF03-570B1B012B44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.1:*:ia64:*:*:*:*:*\",\"matchCriteriaId\":\"ED36543D-C21B-4B4B-A6AD-6E19B08B5DD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.2:*:alpha:*:*:*:*:*\",\"matchCriteriaId\":\"6EAAC51F-9DC5-4026-8147-1B74975D6183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.2:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"6A1EF00A-52E9-4FD8-98FD-3998225D8655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux:7.2:*:ia64:*:*:*:*:*\",\"matchCriteriaId\":\"9D47D6FE-56A9-42CF-9A9B-AEE272C061F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:slackware:slackware_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A9C005-4392-4C95-9B92-98EEC73EFE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:slackware:slackware_linux:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0297F56-5F41-48FD-AB47-36E3BD2AB7E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D76664-F4AC-470A-9686-3F708922A340\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:6.4:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"8A206E1C-C2EC-4356-8777-B18D7069A4C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:*\",\"matchCriteriaId\":\"6E2FE291-1142-4627-A497-C0BB0D934A0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BC7C7E-046C-4186-822E-9F3A2AD3577B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7.0:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"2FE69F6F-6B17-4C87-ACA4-A2A1FB47206A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7.0:*:ppc:*:*:*:*:*\",\"matchCriteriaId\":\"467A30EB-CB8F-4928-AC8F-F659084A9E2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7.0:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"714C1439-AB8E-4A8B-A783-D60E9DDC38D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7.0:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"62CAE5B0-4D46-4A93-A343-C8E9CB574C62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7.1:*:ppc:*:*:*:*:*\",\"matchCriteriaId\":\"65CB09B5-0DE1-49AE-B87E-3C04EEA3E281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7.1:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"0944FD27-736E-4B55-8D96-9F2CA9BB9B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7.1:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"373BB5AC-1F38-4D0A-97DC-08E9654403EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7.1:alpha:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5E71DA3-F4A0-46AF-92A2-E691C7A65528\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7.2:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"1975A2DD-EB22-4ED3-8719-F78AA7F414B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7.3:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"19F606EE-530F-4C06-82DB-52035EE03FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7.3:*:ppc:*:*:*:*:*\",\"matchCriteriaId\":\"A0E896D5-0005-4E7E-895D-B202AFCE09A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7.3:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"5A8B313F-93C7-4558-9571-DE1111487E17\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=bugtraq&m=101128661602088&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=101147632721031&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://online.securityfocus.com/advisories/3833\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://online.securityfocus.com/advisories/3969\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2002/dsa-102\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2002_003_at_txt.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2002-015.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/3886\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/7909\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=101128661602088&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq&m=101147632721031&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://online.securityfocus.com/advisories/3833\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://online.securityfocus.com/advisories/3969\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2002/dsa-102\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2002_003_at_txt.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2002-015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/3886\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/7909\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.\",\"lastModified\":\"2007-03-14T00:00:00\"}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.