search menu icon-carat-right cmu-wordmark

CERT Coordination Center

OpenBSD contains buffer overflow in "select" call

Vulnerability Note VU#259787

Original Release Date: 2002-08-15 | Last Revised: 2002-12-13

Overview

A locally exploitable buffer overflow exists in all versions of OpenBSD.

Description

The buffer overflow exists in the select(2) system call. The overflow occurs if select is supplied with arbitrary negative values.

Impact

Local users can gain system privileges and execute code in the context of the kernel.

Solution

From the OpenBSD Security Advisory: "Apply one of the supplied kernel patches or update to 3.0-stable or 3.1-stable from 2002-08-11 17:00 EDT or later."

Vendor Information

259787
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Niels Provos for reporting this vulnerability.

This document was written by Ian A Finlay.

Other Information

CVE IDs: CVE-2002-1420
Severity Metric: 18.00
Date Public: 2002-08-11
Date First Published: 2002-08-15
Date Last Updated: 2002-12-13 13:33 UTC
Document Revision: 8

Sponsored by CISA.