CVE-2002-0391
high-risk
Published 2002-08-12
Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd.
Do I need to act?
~
8.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (10)
References (76)
Mailing List
http://marc.info/?l=bugtraq&m=103158632831416&w=2
Broken Link
http://online.securityfocus.com/advisories/4402
Broken Link
http://online.securityfocus.com/archive/1/285740
Broken Link
http://rhn.redhat.com/errata/RHSA-2002-166.html
Broken Link
http://rhn.redhat.com/errata/RHSA-2002-172.html
and 56 more references
58
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
10/34 · Low
Exposure
16/34 · Moderate