CVE-2002-0971 (GCVE-0-2002-0971)
Vulnerability from cvelistv5 – Published: 2002-08-23 04:00 – Updated: 2024-08-08 03:12
VLAI?
Summary
Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the "Add new clients" dialogue box.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T03:12:16.453Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "5530",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/5530"
},
{
"name": "vnc-win32-messaging-privileges(9979)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/9979.php"
},
{
"name": "20020821 Win32 API \u0027shatter\u0027 vulnerability found in VNC-based products",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=102994289123085\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2002-08-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the \"Add new clients\" dialogue box."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-10-17T13:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "5530",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/5530"
},
{
"name": "vnc-win32-messaging-privileges(9979)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/9979.php"
},
{
"name": "20020821 Win32 API \u0027shatter\u0027 vulnerability found in VNC-based products",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=bugtraq\u0026m=102994289123085\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2002-0971",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the \"Add new clients\" dialogue box."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "5530",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/5530"
},
{
"name": "vnc-win32-messaging-privileges(9979)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/9979.php"
},
{
"name": "20020821 Win32 API \u0027shatter\u0027 vulnerability found in VNC-based products",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq\u0026m=102994289123085\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2002-0971",
"datePublished": "2002-08-23T04:00:00",
"dateReserved": "2002-08-21T00:00:00",
"dateUpdated": "2024-08-08T03:12:16.453Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:att:winvnc_server:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.3.3_r9\", \"matchCriteriaId\": \"3CA6820A-D28A-49C6-A6D6-D54F95274FE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:att:winvnc_server:3.3.3_r7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FEAAE30-8DA0-4C04-B745-FECCEA0685ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tightvnc:tightvnc:1.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2F4EE57-DA68-4438-A401-BAC82B7242D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tightvnc:tightvnc:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9E11A57-016E-4720-A266-A53743629CD8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tightvnc:tightvnc:1.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FD5B03E-D897-4A06-A3EF-62B13B46B7EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tridia:tridiavnc:1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1E2C09A-A649-4E4C-BC75-45F456546B72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tridia:tridiavnc:1.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39675379-9A88-40AE-85A1-F0E4ADEA1A17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tridia:tridiavnc:1.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"40879BF2-41EB-4170-A7EC-223CB22A83ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:tridia:tridiavnc:1.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13622F73-D0BF-41DD-976F-4926FA5744CC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the \\\"Add new clients\\\" dialogue box.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en VNC, TightVNC, y TridiaVNC permite a usuarios locales ejecutar c\\u00f3digo arbitrario como LocalSystem usando el sistema de mensajes de Win32 para evitar el GUI (Interfaz Gr\\u00e1fico de \\u00dasuario) y acceder al cuadro de di\\u00e1logo \\\"A\\u00f1adir nuevos clientes\\\"\"}]",
"id": "CVE-2002-0971",
"lastModified": "2024-11-20T23:40:17.867",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}",
"published": "2002-09-24T04:00:00.000",
"references": "[{\"url\": \"http://marc.info/?l=bugtraq\u0026m=102994289123085\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.iss.net/security_center/static/9979.php\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/5530\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=102994289123085\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.iss.net/security_center/static/9979.php\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/5530\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2002-0971\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-09-24T04:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the \\\"Add new clients\\\" dialogue box.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en VNC, TightVNC, y TridiaVNC permite a usuarios locales ejecutar c\u00f3digo arbitrario como LocalSystem usando el sistema de mensajes de Win32 para evitar el GUI (Interfaz Gr\u00e1fico de \u00dasuario) y acceder al cuadro de di\u00e1logo \\\"A\u00f1adir nuevos clientes\\\"\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:att:winvnc_server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.3_r9\",\"matchCriteriaId\":\"3CA6820A-D28A-49C6-A6D6-D54F95274FE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:att:winvnc_server:3.3.3_r7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FEAAE30-8DA0-4C04-B745-FECCEA0685ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tightvnc:tightvnc:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2F4EE57-DA68-4438-A401-BAC82B7242D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tightvnc:tightvnc:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9E11A57-016E-4720-A266-A53743629CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tightvnc:tightvnc:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FD5B03E-D897-4A06-A3EF-62B13B46B7EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tridia:tridiavnc:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1E2C09A-A649-4E4C-BC75-45F456546B72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tridia:tridiavnc:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39675379-9A88-40AE-85A1-F0E4ADEA1A17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tridia:tridiavnc:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40879BF2-41EB-4170-A7EC-223CB22A83ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tridia:tridiavnc:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13622F73-D0BF-41DD-976F-4926FA5744CC\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=bugtraq\u0026m=102994289123085\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/9979.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/5530\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=102994289123085\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/9979.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/5530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…