Vulnerabilites related to checkpoint - next_generation
CVE-2002-0428 (GCVE-0-2002-0428)
Vulnerability from cvelistv5
Published
2002-06-11 04:00
Modified
2024-08-08 02:49
Severity ?
CWE
  • n/a
Summary
Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file.
References
http://www.iss.net/security_center/static/8423.php vdb-entry, x_refsource_XF
http://online.securityfocus.com/archive/1/260662 mailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/4253 vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:49:28.462Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "fw1-authentication-bypass-timeouts(8423)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/8423.php"
          },
          {
            "name": "20020308 Checkpoint FW1 SecuRemote/SecureClient \"re-authentication\" (client side hacks of users.C)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/archive/1/260662"
          },
          {
            "name": "4253",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4253"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-03-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the \"authentication timeout\" by modifying the to_expire or expire values in the client\u0027s users.C configuration file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-06-15T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "fw1-authentication-bypass-timeouts(8423)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/8423.php"
        },
        {
          "name": "20020308 Checkpoint FW1 SecuRemote/SecureClient \"re-authentication\" (client side hacks of users.C)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://online.securityfocus.com/archive/1/260662"
        },
        {
          "name": "4253",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4253"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0428",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the \"authentication timeout\" by modifying the to_expire or expire values in the client\u0027s users.C configuration file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "fw1-authentication-bypass-timeouts(8423)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/8423.php"
            },
            {
              "name": "20020308 Checkpoint FW1 SecuRemote/SecureClient \"re-authentication\" (client side hacks of users.C)",
              "refsource": "BUGTRAQ",
              "url": "http://online.securityfocus.com/archive/1/260662"
            },
            {
              "name": "4253",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4253"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0428",
    "datePublished": "2002-06-11T04:00:00",
    "dateReserved": "2002-06-07T00:00:00",
    "dateUpdated": "2024-08-08T02:49:28.462Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-0469 (GCVE-0-2004-0469)
Vulnerability from cvelistv5
Published
2004-05-14 04:00
Modified
2024-08-08 00:17
Severity ?
CWE
  • n/a
Summary
Buffer overflow in the ISAKMP functionality for Check Point VPN-1 and FireWall-1 NG products, before VPN-1/FireWall-1 R55 HFA-03, R54 HFA-410 and NG FP3 HFA-325, or VPN-1 SecuRemote/SecureClient R56, may allow remote attackers to execute arbitrary code during VPN tunnel negotiation.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:17:14.985Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "vpn1-isakmp-bo(16060)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16060"
          },
          {
            "name": "20040504 ISAKMP Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CHECKPOINT",
              "x_transferred"
            ],
            "url": "http://www.checkpoint.com/techsupport/alerts/ike_vpn.html"
          },
          {
            "name": "10273",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/10273"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-05-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the ISAKMP functionality for Check Point VPN-1 and FireWall-1 NG products, before VPN-1/FireWall-1 R55 HFA-03, R54 HFA-410 and NG FP3 HFA-325, or VPN-1 SecuRemote/SecureClient R56, may allow remote attackers to execute arbitrary code during VPN tunnel negotiation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "vpn1-isakmp-bo(16060)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16060"
        },
        {
          "name": "20040504 ISAKMP Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CHECKPOINT"
          ],
          "url": "http://www.checkpoint.com/techsupport/alerts/ike_vpn.html"
        },
        {
          "name": "10273",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/10273"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0469",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the ISAKMP functionality for Check Point VPN-1 and FireWall-1 NG products, before VPN-1/FireWall-1 R55 HFA-03, R54 HFA-410 and NG FP3 HFA-325, or VPN-1 SecuRemote/SecureClient R56, may allow remote attackers to execute arbitrary code during VPN tunnel negotiation."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "vpn1-isakmp-bo(16060)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16060"
            },
            {
              "name": "20040504 ISAKMP Vulnerability",
              "refsource": "CHECKPOINT",
              "url": "http://www.checkpoint.com/techsupport/alerts/ike_vpn.html"
            },
            {
              "name": "10273",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/10273"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0469",
    "datePublished": "2004-05-14T04:00:00",
    "dateReserved": "2004-05-12T00:00:00",
    "dateUpdated": "2024-08-08T00:17:14.985Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2004-07-07 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in the ISAKMP functionality for Check Point VPN-1 and FireWall-1 NG products, before VPN-1/FireWall-1 R55 HFA-03, R54 HFA-410 and NG FP3 HFA-325, or VPN-1 SecuRemote/SecureClient R56, may allow remote attackers to execute arbitrary code during VPN tunnel negotiation.
Impacted products
Vendor Product Version
checkpoint firewall-1 *
checkpoint firewall-1 2.0
checkpoint firewall-1 2.0.1
checkpoint next_generation *
checkpoint ng-ai r54
checkpoint ng-ai r55
checkpoint vpn-1 vsx_2.0.1
checkpoint vpn-1 vsx_ng_with_application_intelligence



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:*:*:vsx-ng-ai:*:*:*:*:*",
              "matchCriteriaId": "AA9A50A1-CA8C-4EE5-B68F-4958F6B4B028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:2.0:*:gx:*:*:*:*:*",
              "matchCriteriaId": "8C83ABA2-87CD-429B-9800-590F8256B064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:2.0.1:*:vsx:*:*:*:*:*",
              "matchCriteriaId": "E77F0C13-C65F-44DC-BD5D-A8F5CBF33F07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:next_generation:*:*:fp3:*:*:*:*:*",
              "matchCriteriaId": "148E888C-9705-4015-ADF2-5863715D8041",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:ng-ai:r54:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E1C23E-E495-4724-92AB-E1AB425FBB7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:ng-ai:r55:*:*:*:*:*:*:*",
              "matchCriteriaId": "60BC085B-508F-460F-8BE5-0B2842123DA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:vpn-1:vsx_2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E5F3217-844F-41BB-8A7F-1D2F4445F3FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:vpn-1:vsx_ng_with_application_intelligence:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5EF01C8-1C8A-4BD1-A13B-CE31F09F9523",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the ISAKMP functionality for Check Point VPN-1 and FireWall-1 NG products, before VPN-1/FireWall-1 R55 HFA-03, R54 HFA-410 and NG FP3 HFA-325, or VPN-1 SecuRemote/SecureClient R56, may allow remote attackers to execute arbitrary code during VPN tunnel negotiation."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en la funcionalidad ISAKMP de los productos Check Point VPN-1 y FireWall-1 NG, anteriores a VPN-1/FireWall-1 R55 HFA-03, R54 HFA-410 y NG FP3 HFA-325, o VPN-1 SecuRemote/SecureClient R56, puede permitir a atacantes remotos ejecutar c\u00f3digo arbitrario mediane una negociaci\u00f3n de tunel VPN."
    }
  ],
  "id": "CVE-2004-0469",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-07-07T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.checkpoint.com/techsupport/alerts/ike_vpn.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/10273"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.checkpoint.com/techsupport/alerts/ike_vpn.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/10273"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16060"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-08-12 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkpoint:check_point_vpn:1_4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5BEA055-A8FC-4A7C-A207-03AB340649D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:check_point_vpn:1_4.1_sp1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E70DB9-7B37-4001-AC50-90FED1082187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:check_point_vpn:1_4.1_sp2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C429DA4B-D3C1-43AF-8AF8-69F177D26861",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:check_point_vpn:1_4.1_sp3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB00EB68-0512-4AB3-A3F6-E2928F0A325F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:check_point_vpn:1_4.1_sp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E12BA38-E45F-45C2-A722-B7A05072A4B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F543272-8C7E-4326-BA97-142FBEA641E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "74D81CF6-8E46-4BED-BC1E-9470E6088521",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.0:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "84C971FD-7282-4806-A717-686C3AE72A33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.0:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "D8B8D963-B447-4B53-8449-D53E1CED11BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.0:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "5F7A328F-CB62-40FA-A9B0-BFAB9F487689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.0:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "2AA58BEC-68C0-401A-A1DE-353451E86648",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.0:sp6:*:*:*:*:*:*",
              "matchCriteriaId": "D5AA0024-EBDC-42F7-8ED6-4651FFBA9668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.0:sp7:*:*:*:*:*:*",
              "matchCriteriaId": "743B9B05-7D09-4AA1-A1CC-D249F57B8156",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.0:sp8:*:*:*:*:*:*",
              "matchCriteriaId": "5ADFB8F4-21EF-4E74-BD0E-DF4692DC9842",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "100F03E3-1538-47AF-9CA6-E9E5C1DF05D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.1:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "AFCB5D3D-E8C6-43CE-A1D4-7F46519E9893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.1:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "0A7ED9A2-3996-4ABE-B0EF-92ACF6C8A38B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.1:sp3:*:*:*:*:*:*",
              "matchCriteriaId": "997ABD78-6DF8-440C-B90A-E5CD7C6ACA75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.1:sp4:*:*:*:*:*:*",
              "matchCriteriaId": "60536AAF-76BC-4773-98FA-5F01E2D231FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:firewall-1:4.1:sp5:*:*:*:*:*:*",
              "matchCriteriaId": "1E4206C4-05A7-46D1-90C7-6BA7744C7AD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkpoint:next_generation:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5684554-DE87-450B-B8DA-5140BC7B8406",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the \"authentication timeout\" by modifying the to_expire or expire values in the client\u0027s users.C configuration file."
    }
  ],
  "id": "CVE-2002-0428",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-08-12T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://online.securityfocus.com/archive/1/260662"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/8423.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://online.securityfocus.com/archive/1/260662"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/8423.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4253"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}