fkie_cve-2002-1232
Vulnerability from fkie_nvd
Published
2002-11-04 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Memory leak in ypdb_open in yp_db.c for ypserv before 2.5 in the NIS package 3.9 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of requests for a map that does not exist.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 2.2 | |
debian | debian_linux | 2.2 | |
debian | debian_linux | 2.2 | |
debian | debian_linux | 2.2 | |
debian | debian_linux | 2.2 | |
debian | debian_linux | 2.2 | |
debian | debian_linux | 2.2 | |
debian | debian_linux | 3.0 | |
debian | debian_linux | 3.0 | |
debian | debian_linux | 3.0 | |
debian | debian_linux | 3.0 | |
debian | debian_linux | 3.0 | |
debian | debian_linux | 3.0 | |
debian | debian_linux | 3.0 | |
debian | debian_linux | 3.0 | |
debian | debian_linux | 3.0 | |
debian | debian_linux | 3.0 | |
debian | debian_linux | 3.0 | |
hp | secure_os | 1.0 | |
redhat | linux | 6.2 | |
redhat | linux | 6.2 | |
redhat | linux | 6.2 | |
redhat | linux | 6.2 | |
redhat | linux | 7.0 | |
redhat | linux | 7.0 | |
redhat | linux | 7.0 | |
redhat | linux | 7.1 | |
redhat | linux | 7.1 | |
redhat | linux | 7.1 | |
redhat | linux | 7.2 | |
redhat | linux | 7.2 | |
redhat | linux | 7.3 | |
redhat | linux | 7.3 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*", matchCriteriaId: "58B90124-0543-4226-BFF4-13CCCBCCB243", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:2.2:*:68k:*:*:*:*:*", matchCriteriaId: "E040A866-0D2C-40E1-B1FB-DB600B389E27", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:*", matchCriteriaId: "CE1C944A-E5F1-49DE-B069-2A358123B535", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:2.2:*:arm:*:*:*:*:*", matchCriteriaId: "D71083B4-1736-4501-8DE8-BC24AC1447AA", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:2.2:*:ia-32:*:*:*:*:*", matchCriteriaId: "E9D468DB-C4AE-4ACB-B3B7-2FAEA90D6A49", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:2.2:*:powerpc:*:*:*:*:*", matchCriteriaId: "2A32E486-2598-41B3-B6DB-3CC46D239AFC", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:*", matchCriteriaId: "AAEE18D8-AA3B-47A3-AA7C-AAFF7591F391", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", matchCriteriaId: "2CAE037F-111C-4A76-8FFE-716B74D65EF3", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*", matchCriteriaId: "A6B060E4-B5A6-4469-828E-211C52542547", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*", matchCriteriaId: "974C3541-990C-4CD4-A05A-38FA74A84632", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*", matchCriteriaId: "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*", matchCriteriaId: "C9419322-572F-4BB6-8416-C5E96541CF33", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*", matchCriteriaId: "BFC50555-C084-46A3-9C9F-949C5E3BB448", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*", matchCriteriaId: "9C25D6E1-D283-4CEA-B47B-60C47A5C0797", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*", matchCriteriaId: "AD18A446-C634-417E-86AC-B19B6DDDC856", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*", matchCriteriaId: "E4BB852E-61B2-4842-989F-C6C0C901A8D7", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*", matchCriteriaId: "24DD9D59-E2A2-4116-A887-39E8CC2004FC", vulnerable: true, }, { criteria: "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*", matchCriteriaId: "F28D7457-607E-4E0C-909A-413F91CFCD82", vulnerable: true, }, { criteria: "cpe:2.3:o:hp:secure_os:1.0:*:linux:*:*:*:*:*", matchCriteriaId: "B345284D-6842-47C0-B823-B5DDC30CC8A6", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*", matchCriteriaId: "0633B5A6-7A88-4A96-9462-4C09D124ED36", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*", matchCriteriaId: "344610A8-DB6D-4407-9304-916C419F648C", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*", matchCriteriaId: "B7EC2B95-4715-4EC9-A10A-2542501F8A61", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*", matchCriteriaId: "64775BEF-2E53-43CA-8639-A7E54F6F4222", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*", matchCriteriaId: "29B186E5-7C2F-466E-AA4A-8F2B618F8A14", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.0:*:alpha:*:*:*:*:*", matchCriteriaId: "FD6576E2-9F26-4857-9F28-F51899F1EF48", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.0:*:i386:*:*:*:*:*", matchCriteriaId: "4DC9842D-E23B-4B9F-A7BF-57C3BA3DE398", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*", matchCriteriaId: "1D46E093-1C68-43BB-B281-12117EC8DE0F", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.1:*:i386:*:*:*:*:*", matchCriteriaId: "C8783A6D-DFD8-45DD-BF03-570B1B012B44", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.1:*:ia64:*:*:*:*:*", matchCriteriaId: "ED36543D-C21B-4B4B-A6AD-6E19B08B5DD7", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*", matchCriteriaId: "E562907F-D915-4030-847A-3C6834A80D4E", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.2:*:ia64:*:*:*:*:*", matchCriteriaId: "9D47D6FE-56A9-42CF-9A9B-AEE272C061F7", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*", matchCriteriaId: "138985E6-5107-4E8B-A801-C3D5FE075227", vulnerable: true, }, { criteria: "cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*", matchCriteriaId: "9B502A61-44FB-4CD4-85BE-88D4ACCCA441", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Memory leak in ypdb_open in yp_db.c for ypserv before 2.5 in the NIS package 3.9 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of requests for a map that does not exist.", }, { lang: "es", value: "Fuga de memoria en ypdb_open en yp_db.c en ypserv anteriores a 2.5 en el paquete NIS 3.9 y anteriores permite a atacantes remotos causar una denegación de servicio (consumición de memoria) mediante un número grande de peticiones de un mapa inexistente.", }, ], id: "CVE-2002-1232", lastModified: "2025-04-03T01:03:51.193", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2002-11-04T05:00:00.000", references: [ { source: "cve@mitre.org", url: "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-054.0.txt", }, { source: "cve@mitre.org", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000539", }, { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=103582692228894&w=2", }, { source: "cve@mitre.org", url: "http://online.securityfocus.com/advisories/4605", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2002/dsa-180", }, { source: "cve@mitre.org", tags: [ "Vendor Advisory", ], url: "http://www.iss.net/security_center/static/10423.php", }, { source: "cve@mitre.org", url: "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-078.php", }, { source: "cve@mitre.org", tags: [ "Patch", ], url: "http://www.redhat.com/support/errata/RHSA-2002-223.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2002-224.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2003-229.html", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/6016", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-054.0.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000539", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=103582692228894&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://online.securityfocus.com/advisories/4605", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.debian.org/security/2002/dsa-180", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://www.iss.net/security_center/static/10423.php", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-078.php", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", ], url: "http://www.redhat.com/support/errata/RHSA-2002-223.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2002-224.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2003-229.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "http://www.securityfocus.com/bid/6016", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.