CVE-2002-1506

Buffer overflow in Linuxconf before 1.28r4 allows local users to execute arbitrary code via a long LINUXCONF_LANG environment variable, which overflows an error string that is generated.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jacques_gelinas:linuxconf:1.1.6r10:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.1.9r1:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.1.9r2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r1:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r3:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r4:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r5:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r6:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r7:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.1r8:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.3r1:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.3r2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4r2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4r4:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2.4r5:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2r1:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.2r2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.27:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.27r3:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.27r4:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.27r5:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.28:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.28r1:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.28r2:*:*:*:*:*:*:*
cpe:2.3:a:jacques_gelinas:linuxconf:1.28r3:*:*:*:*:*:*:*

History

20 Nov 2024, 23:41

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2002-08/0304.html - Exploit, Patch, Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2002-08/0304.html - Exploit, Patch, Vendor Advisory
References () http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0093.html - () http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0093.html -
References () http://www.iss.net/security_center/static/9980.php - Patch, Vendor Advisory () http://www.iss.net/security_center/static/9980.php - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/5585 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/5585 - Exploit, Patch, Vendor Advisory
References () http://www.solucorp.qc.ca/changes.hc?projet=linuxconf&version=1.28r4 - () http://www.solucorp.qc.ca/changes.hc?projet=linuxconf&version=1.28r4 -

Information

Published : 2003-04-02 05:00

Updated : 2025-04-03 01:03


NVD link : CVE-2002-1506

Mitre link : CVE-2002-1506

CVE.ORG link : CVE-2002-1506


JSON object : View

Products Affected

jacques_gelinas

  • linuxconf