Vulnerability Details : CVE-2002-0572
FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files.
Threat overview for CVE-2002-0572
Top countries where our scanners detected CVE-2002-0572
Top open port discovered on systems with this issue
554
IPs affected by CVE-2002-0572 2
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2002-0572!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2002-0572
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ % EPSS Score History EPSS FAQ
CVSS scores for CVE-2002-0572
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2002-0572
-
http://www.securityfocus.com/bid/4568
Exploit;Patch;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/809347
US Government Resource
-
http://www.iss.net/security_center/static/8920.php
-
http://online.securityfocus.com/archive/1/269102
-
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:23.stdio.asc
Patch;Vendor Advisory
-
http://www.ciac.org/ciac/bulletins/m-072.shtml
-
http://online.securityfocus.com/archive/1/268970
Exploit;Patch;Vendor Advisory
-
http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0033.html
Products affected by CVE-2002-0572
- cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*
- cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*
- cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*
- cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*
- cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*