Overview
A locally exploitable buffer overflow exists in all versions of OpenBSD.
Description
The buffer overflow exists in the select(2) system call. The overflow occurs if select is supplied with arbitrary negative values. |
Impact
Local users can gain system privileges and execute code in the context of the kernel. |
Solution
From the OpenBSD Security Advisory: "Apply one of the supplied kernel patches or update to 3.0-stable or 3.1-stable from 2002-08-11 17:00 EDT or later." |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Niels Provos for reporting this vulnerability.
This document was written by Ian A Finlay.
Other Information
CVE IDs: | CVE-2002-1420 |
Severity Metric: | 18.00 |
Date Public: | 2002-08-11 |
Date First Published: | 2002-08-15 |
Date Last Updated: | 2002-12-13 13:33 UTC |
Document Revision: | 8 |