fkie_cve-2002-0357
Vulnerability from fkie_nvd
Published
2002-06-18 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in rpc.passwd in the nfs.sw.nis subsystem of SGI IRIX 6.5.15 and earlier allows local users to gain root privileges.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sgi | irix | 6.5 | |
sgi | irix | 6.5.1 | |
sgi | irix | 6.5.2 | |
sgi | irix | 6.5.2f | |
sgi | irix | 6.5.2m | |
sgi | irix | 6.5.3 | |
sgi | irix | 6.5.3f | |
sgi | irix | 6.5.3m | |
sgi | irix | 6.5.4 | |
sgi | irix | 6.5.4f | |
sgi | irix | 6.5.4m | |
sgi | irix | 6.5.5 | |
sgi | irix | 6.5.5f | |
sgi | irix | 6.5.5m | |
sgi | irix | 6.5.6 | |
sgi | irix | 6.5.6f | |
sgi | irix | 6.5.6m | |
sgi | irix | 6.5.7 | |
sgi | irix | 6.5.7f | |
sgi | irix | 6.5.7m | |
sgi | irix | 6.5.8 | |
sgi | irix | 6.5.8f | |
sgi | irix | 6.5.8m | |
sgi | irix | 6.5.9 | |
sgi | irix | 6.5.9f | |
sgi | irix | 6.5.9m | |
sgi | irix | 6.5.10 | |
sgi | irix | 6.5.10f | |
sgi | irix | 6.5.10m | |
sgi | irix | 6.5.11 | |
sgi | irix | 6.5.11f | |
sgi | irix | 6.5.11m | |
sgi | irix | 6.5.12 | |
sgi | irix | 6.5.12f | |
sgi | irix | 6.5.12m | |
sgi | irix | 6.5.13 | |
sgi | irix | 6.5.13f | |
sgi | irix | 6.5.13m | |
sgi | irix | 6.5.14 | |
sgi | irix | 6.5.14f | |
sgi | irix | 6.5.14m | |
sgi | irix | 6.5.15 | |
sgi | irix | 6.5.15f | |
sgi | irix | 6.5.15m |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "36B60E50-4F5A-4404-BEA3-C94F7D27B156", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "6ECB750B-9F53-4DB6-8B26-71BCCA446FF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.2f:*:*:*:*:*:*:*", "matchCriteriaId": "BB113626-38E2-4C42-A6A9-4BBDA0AC4A96", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*", "matchCriteriaId": "772E3C7E-9947-414F-8642-18653BB048E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6B2E6D1-8C2D-4E15-A6BB-E4FE878ED1E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*", "matchCriteriaId": "8D51EC29-8836-4F87-ABF8-FF7530DECBB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*", "matchCriteriaId": "518B7253-7B0F-4A0A-ADA7-F3E3B5AAF877", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "440B7208-34DB-4898-8461-4E703F7EDFB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.4f:*:*:*:*:*:*:*", "matchCriteriaId": "3CEC8518-4DBA-43AA-90B8-279F2DD4A2DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.4m:*:*:*:*:*:*:*", "matchCriteriaId": "3F8286F3-DF0E-4D8E-A27D-0C5182D5870C", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "5663579C-3AD2-4E5B-A595-C8DB984F9C26", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.5f:*:*:*:*:*:*:*", "matchCriteriaId": "B306EE13-57CF-43A6-AA72-C641C53A2A23", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.5m:*:*:*:*:*:*:*", "matchCriteriaId": "6291BEE1-73D2-4976-B065-E135880F73B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D07AA144-6FD7-4C80-B4F2-D21C1AFC864A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.6f:*:*:*:*:*:*:*", "matchCriteriaId": "621C31D9-8102-4F2D-8008-B32020F0B831", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.6m:*:*:*:*:*:*:*", "matchCriteriaId": "3FF5E9B8-62F9-4A6F-9C0C-551980981366", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "29113D8E-9618-4A0E-9157-678332082858", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.7f:*:*:*:*:*:*:*", "matchCriteriaId": "F883CF73-CDA0-4B50-98E6-1B5DE0A4A816", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.7m:*:*:*:*:*:*:*", "matchCriteriaId": "C6C9F200-68AC-4B45-8AFC-F604429FDF3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "313613E9-4837-433C-90EE-84A92E8D24E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.8f:*:*:*:*:*:*:*", "matchCriteriaId": "1742BF2B-63C7-441D-9A01-DE65C95911D4", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.8m:*:*:*:*:*:*:*", "matchCriteriaId": "D30B7C42-CEE8-4377-957C-BCCE35C071A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "41AA1290-5039-406F-B195-3A4C018202D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.9f:*:*:*:*:*:*:*", "matchCriteriaId": "B859D7F7-B0A6-4148-8146-F651ED3F99AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.9m:*:*:*:*:*:*:*", "matchCriteriaId": "59EC5B1A-309A-4DE2-A197-F4DC07A8DC3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "60CC9410-F6B8-4748-B76F-30626279028E", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.10f:*:*:*:*:*:*:*", "matchCriteriaId": "0E7D3C74-CDD2-4DFF-A331-007E1669752A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.10m:*:*:*:*:*:*:*", "matchCriteriaId": "03FA10EA-F6E5-4A89-AC37-40FF6A147528", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "DCC67401-C85A-4E4E-AE61-85FEBBF4346B", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.11f:*:*:*:*:*:*:*", "matchCriteriaId": "7C8E0DF6-D9C2-4DBC-9997-B5BFC6DEC9F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.11m:*:*:*:*:*:*:*", "matchCriteriaId": "D1E1480B-2183-45AD-B63F-16DEC9BF0398", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "1C4427AC-07C1-4765-981B-B5D86D698C2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.12f:*:*:*:*:*:*:*", "matchCriteriaId": "2D08345C-F945-410C-9DCB-8C358178F975", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.12m:*:*:*:*:*:*:*", "matchCriteriaId": "8764BE36-9377-486C-9198-DF79A5A60679", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "63EF0CEE-74A9-45C8-8AFD-77815230ACC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.13f:*:*:*:*:*:*:*", "matchCriteriaId": "25243FA1-7AF7-41D4-8FAD-A5AB289E120D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.13m:*:*:*:*:*:*:*", "matchCriteriaId": "94D89730-AA61-4FC9-A6AB-0574CA51EE75", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5B24D34C-1F95-45C8-9A57-2D2622ED9019", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*", "matchCriteriaId": "A7B59E7C-B059-41CD-AE33-E9623ADA12BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*", "matchCriteriaId": "0DF1B657-C910-4BB0-828C-09B6A59D988D", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "6BD69805-D021-4DCC-9FB6-A0BEA721408A", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*", "matchCriteriaId": "72D61A9F-AC57-4DD9-9047-74BFA9BFACFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*", "matchCriteriaId": "C254FC5D-895D-4EFC-B9A7-74699D9FE65E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in rpc.passwd in the nfs.sw.nis subsystem of SGI IRIX 6.5.15 and earlier allows local users to gain root privileges." } ], "id": "CVE-2002-0357", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-06-18T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20020601-01-P" }, { "source": "cve@mitre.org", "url": "http://www.ciac.org/ciac/bulletins/m-087.shtml" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/9261.php" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/430419" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/834" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/4939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "ftp://patches.sgi.com/support/free/security/advisories/20020601-01-P" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ciac.org/ciac/bulletins/m-087.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/9261.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/430419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/834" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/4939" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…