ID CVE-2002-1742
Type cve
Reporter NVD
Modified 2017-07-10T21:29:23
Description
SOAP::Lite 0.50 through 0.52 allows remote attackers to load arbitrary Perl functions by suppling a non-existent function in a script using a SOAP::Lite module, which causes the AUTOLOAD subroutine to trigger.
{"id": "CVE-2002-1742", "bulletinFamily": "NVD", "title": "CVE-2002-1742", "description": "SOAP::Lite 0.50 through 0.52 allows remote attackers to load arbitrary Perl functions by suppling a non-existent function in a script using a SOAP::Lite module, which causes the AUTOLOAD subroutine to trigger.", "published": "2002-12-31T00:00:00", "modified": "2017-07-10T21:29:23", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1742", "reporter": "NVD", "references": ["http://www.soaplite.com/", "https://exchange.xforce.ibmcloud.com/vulnerabilities/8838", "http://www.phrack.org/show.php?p=58&a=9", "http://use.perl.org/articles/02/04/09/000212.shtml?tid=5", "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A02.asc", "http://www.securityfocus.com/bid/4493"], "cvelist": ["CVE-2002-1742"], "type": "cve", "lastseen": "2017-07-11T11:14:12", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:paul_kulchenko:soap_lite:0.50", "cpe:/a:paul_kulchenko:soap_lite:0.51", "cpe:/a:paul_kulchenko:soap_lite:0.52"], "cvelist": ["CVE-2002-1742"], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:PARTIAL/A:NONE/"}, "description": "SOAP::Lite 0.50 through 0.52 allows remote attackers to load arbitrary Perl functions by suppling a non-existent function in a script using a SOAP::Lite module, which causes the AUTOLOAD subroutine to trigger.", "edition": 1, "enchantments": {}, "hash": "c91bc7da0196b7b62616f40a1c8451d0290fdb3161fcd247f0129c97acea64ec", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "fd880d5c3c7d2f2e332888010cd3c5db", "key": "title"}, {"hash": "9679315809ee15c5f5f672c5ff86ef96", "key": "href"}, {"hash": "6f42f062f51ed56e7c030193c22ec81b", "key": "references"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "26769fd423968d45be7383413e2552f1", "key": "cvss"}, {"hash": "e07460afaf04847753b34c056dcff13f", "key": "modified"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "cf87b4eeaf146ab4ae076822b3a692ba", "key": "description"}, {"hash": "acc4130deae029fcb579f5daed93f172", "key": "published"}, {"hash": "c4f119233a25c660c81ef6764fcd5ddb", "key": "cpe"}, {"hash": "5220ce09aa92675305f044f3ea88f0e4", "key": "cvelist"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1742", "id": "CVE-2002-1742", "lastseen": "2016-09-03T03:42:11", "modified": "2008-09-05T16:31:24", "objectVersion": "1.2", "published": "2002-12-31T00:00:00", "references": ["http://www.soaplite.com/", "http://www.phrack.org/show.php?p=58&a=9", "http://xforce.iss.net/xforce/xfdb/8838", "http://use.perl.org/articles/02/04/09/000212.shtml?tid=5", "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A02.asc", "http://www.securityfocus.com/bid/4493"], "reporter": "NVD", "scanner": [], "title": "CVE-2002-1742", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T03:42:11"}], "edition": 2, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "c4f119233a25c660c81ef6764fcd5ddb"}, {"key": "cvelist", "hash": "5220ce09aa92675305f044f3ea88f0e4"}, {"key": "cvss", "hash": "26769fd423968d45be7383413e2552f1"}, {"key": "description", "hash": "cf87b4eeaf146ab4ae076822b3a692ba"}, {"key": "href", "hash": "9679315809ee15c5f5f672c5ff86ef96"}, {"key": "modified", "hash": "5e778e8f09123061335bafe505f6cf6e"}, {"key": "published", "hash": "acc4130deae029fcb579f5daed93f172"}, {"key": "references", "hash": "1fdcc2c081ff6e2597b1eb3085786b44"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "fd880d5c3c7d2f2e332888010cd3c5db"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "fe1556f34772f11572effd16552b9203e8ab4720d566b4e58c567414f3f42aff", "viewCount": 0, "enchantments": {"score": {"value": 7.5, "vector": "NONE", "modified": "2017-07-11T11:14:12"}, "dependencies": {"references": [], "modified": "2017-07-11T11:14:12"}, "vulnersScore": 7.5}, "objectVersion": "1.3", "cpe": ["cpe:/a:paul_kulchenko:soap_lite:0.50", "cpe:/a:paul_kulchenko:soap_lite:0.51", "cpe:/a:paul_kulchenko:soap_lite:0.52"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{}