Vulnerability Details : CVE-2002-0836
dvips converter for Postscript files in the tetex package calls the system() function insecurely, which allows remote attackers to execute arbitrary commands via certain print jobs, possibly involving fonts.
Exploit prediction scoring system (EPSS) score for CVE-2002-0836
Probability of exploitation activity in the next 30 days: 1.14%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 83 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2002-0836
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2002-0836
-
http://www.debian.org/security/2002/dsa-207
Patch;Vendor Advisory
-
http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-070.php
-
http://marc.info/?l=bugtraq&m=103497852330838&w=2
-
http://www.iss.net/security_center/static/10365.php
Vendor Advisory
-
http://www.securityfocus.com/advisories/4567
-
http://www.redhat.com/support/errata/RHSA-2002-195.html
-
http://marc.info/?l=bugtraq&m=104005975415582&w=2
-
http://www.redhat.com/support/errata/RHSA-2002-194.html
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/5978
Patch;Vendor Advisory
-
http://www.kb.cert.org/vuls/id/169841
US Government Resource
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000537
Products affected by CVE-2002-0836
- cpe:2.3:o:hp:secure_os:1.0:*:linux:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.0:*:alpha:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.0:*:i386:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.1:*:i386:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.2:*:i386:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.1:*:ia64:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.2:*:ia64:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.1:*:alpha:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:8.0:*:i386:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.3:*:i386:*:*:*:*:*