GSD-2002-0412

Vulnerability from gsd - Updated: 2023-12-13 01:24
Details
Format string vulnerability in TraceEvent function for ntop before 2.1 allows remote attackers to execute arbitrary code by causing format strings to be injected into calls to the syslog function, via (1) an HTTP GET request, (2) a user name in HTTP authentication, or (3) a password in HTTP authentication.
Aliases
Aliases

{
  "GSD": {
    "alias": "CVE-2002-0412",
    "description": "Format string vulnerability in TraceEvent function for ntop before 2.1 allows remote attackers to execute arbitrary code by causing format strings to be injected into calls to the syslog function, via (1) an HTTP GET request, (2) a user name in HTTP authentication, or (3) a password in HTTP authentication.",
    "id": "GSD-2002-0412"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2002-0412"
      ],
      "details": "Format string vulnerability in TraceEvent function for ntop before 2.1 allows remote attackers to execute arbitrary code by causing format strings to be injected into calls to the syslog function, via (1) an HTTP GET request, (2) a user name in HTTP authentication, or (3) a password in HTTP authentication.",
      "id": "GSD-2002-0412",
      "modified": "2023-12-13T01:24:08.063004Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2002-0412",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Format string vulnerability in TraceEvent function for ntop before 2.1 allows remote attackers to execute arbitrary code by causing format strings to be injected into calls to the syslog function, via (1) an HTTP GET request, (2) a user name in HTTP authentication, or (3) a password in HTTP authentication."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "http://snapshot.ntop.org/",
            "refsource": "CONFIRM",
            "url": "http://snapshot.ntop.org/"
          },
          {
            "name": "20020411 re: gobbles ntop alert",
            "refsource": "BUGTRAQ",
            "url": "http://marc.info/?l=bugtraq\u0026m=101856541322245\u0026w=2"
          },
          {
            "name": "http://listmanager.unipi.it/pipermail/ntop-dev/2002-February/000489.html",
            "refsource": "MISC",
            "url": "http://listmanager.unipi.it/pipermail/ntop-dev/2002-February/000489.html"
          },
          {
            "name": "ntop-traceevent-format-string(8347)",
            "refsource": "XF",
            "url": "http://www.iss.net/security_center/static/8347.php"
          },
          {
            "name": "5307",
            "refsource": "OSVDB",
            "url": "http://www.osvdb.org/5307"
          },
          {
            "name": "20020417 segfault in ntop",
            "refsource": "BUGTRAQ",
            "url": "http://marc.info/?l=bugtraq\u0026m=101908224609740\u0026w=2"
          },
          {
            "name": "20020304 [H20020304]: Remotely exploitable format string vulnerability in ntop",
            "refsource": "BUGTRAQ",
            "url": "http://online.securityfocus.com/archive/1/259642"
          },
          {
            "name": "20020304 [VulnWatch] [H20020304]: Remotely exploitable format string vulnerability in ntop",
            "refsource": "VULNWATCH",
            "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0056.html"
          },
          {
            "name": "20020411 ALERT ALERT ALERT ALERT ALERT ALERT ALERT ALERT ALERT ALERT ALERT",
            "refsource": "BUGTRAQ",
            "url": "http://marc.info/?l=bugtraq\u0026m=101854261030453\u0026w=2"
          },
          {
            "name": "4225",
            "refsource": "BID",
            "url": "http://www.securityfocus.com/bid/4225"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:luca_deri:ntop:2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0412"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Format string vulnerability in TraceEvent function for ntop before 2.1 allows remote attackers to execute arbitrary code by causing format strings to be injected into calls to the syslog function, via (1) an HTTP GET request, (2) a user name in HTTP authentication, or (3) a password in HTTP authentication."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "NVD-CWE-Other"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020304 [H20020304]: Remotely exploitable format string vulnerability in ntop",
              "refsource": "BUGTRAQ",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "http://online.securityfocus.com/archive/1/259642"
            },
            {
              "name": "ntop-traceevent-format-string(8347)",
              "refsource": "XF",
              "tags": [
                "Patch",
                "Vendor Advisory"
              ],
              "url": "http://www.iss.net/security_center/static/8347.php"
            },
            {
              "name": "4225",
              "refsource": "BID",
              "tags": [
                "Patch",
                "Vendor Advisory"
              ],
              "url": "http://www.securityfocus.com/bid/4225"
            },
            {
              "name": "http://snapshot.ntop.org/",
              "refsource": "CONFIRM",
              "tags": [],
              "url": "http://snapshot.ntop.org/"
            },
            {
              "name": "http://listmanager.unipi.it/pipermail/ntop-dev/2002-February/000489.html",
              "refsource": "MISC",
              "tags": [],
              "url": "http://listmanager.unipi.it/pipermail/ntop-dev/2002-February/000489.html"
            },
            {
              "name": "20020304 [VulnWatch] [H20020304]: Remotely exploitable format string vulnerability in ntop",
              "refsource": "VULNWATCH",
              "tags": [],
              "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0056.html"
            },
            {
              "name": "5307",
              "refsource": "OSVDB",
              "tags": [],
              "url": "http://www.osvdb.org/5307"
            },
            {
              "name": "20020417 segfault in ntop",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://marc.info/?l=bugtraq\u0026m=101908224609740\u0026w=2"
            },
            {
              "name": "20020411 re: gobbles ntop alert",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://marc.info/?l=bugtraq\u0026m=101856541322245\u0026w=2"
            },
            {
              "name": "20020411 ALERT ALERT ALERT ALERT ALERT ALERT ALERT ALERT ALERT ALERT ALERT",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://marc.info/?l=bugtraq\u0026m=101854261030453\u0026w=2"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "cvssV2": {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 10.0,
          "impactScore": 6.4,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": true,
          "obtainUserPrivilege": false,
          "severity": "HIGH",
          "userInteractionRequired": false
        }
      },
      "lastModifiedDate": "2016-10-18T02:20Z",
      "publishedDate": "2002-08-12T04:00Z"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…