CVE-2002-1420

Integer signedness error in select() on OpenBSD 3.1 and earlier allows local users to overwrite arbitrary kernel memory via a negative value for the size parameter, which satisfies the boundary check as a signed integer, but is later used as an unsigned integer during a data copying operation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:41

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=102918817012863&w=2 - () http://marc.info/?l=bugtraq&m=102918817012863&w=2 -
References () http://www.iss.net/security_center/static/9809.php - Patch, Vendor Advisory () http://www.iss.net/security_center/static/9809.php - Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/259787 - US Government Resource () http://www.kb.cert.org/vuls/id/259787 - US Government Resource
References () http://www.osvdb.org/7554 - () http://www.osvdb.org/7554 -
References () http://www.securityfocus.com/bid/5442 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/5442 - Patch, Vendor Advisory

Information

Published : 2003-04-11 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2002-1420

Mitre link : CVE-2002-1420

CVE.ORG link : CVE-2002-1420


JSON object : View

Products Affected

openbsd

  • openbsd