10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.85 High
EPSS
Percentile
98.6%
The remote host is missing the patch for the advisory SUSE-SA:2002:031 (glibc).
An integer overflow has been discovered in the xdr_array() function, contained in the Sun Microsystems RPC/XDR library, which is part of the glibc library package on all SUSE products. This overflow allows a remote attacker to overflow a buffer, leading to remote execution of arbitrary code supplied by the attacker.
There is no temporary workaround for this security problem other than disabling all RPC based server and client programs. The permanent solution is to update the glibc packages with the update packages listed below.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2002:031
#
if ( ! defined_func("bn_random") ) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if(description)
{
script_id(13753);
script_bugtraq_id(5356);
script_version("1.18");
script_cve_id("CVE-2002-0391");
name["english"] = "SUSE-SA:2002:031: glibc";
script_name(english:name["english"]);
script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a vendor-supplied security patch" );
script_set_attribute(attribute:"description", value:
"The remote host is missing the patch for the advisory SUSE-SA:2002:031 (glibc).
An integer overflow has been discovered in the xdr_array() function,
contained in the Sun Microsystems RPC/XDR library, which is part of
the glibc library package on all SUSE products. This overflow allows
a remote attacker to overflow a buffer, leading to remote execution of
arbitrary code supplied by the attacker.
There is no temporary workaround for this security problem other than
disabling all RPC based server and client programs. The permanent
solution is to update the glibc packages with the update packages
listed below." );
script_set_attribute(attribute:"solution", value:
"http://www.suse.de/security/2002_031_glibc.html" );
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
script_set_attribute(attribute:"canvas_package", value:'CANVAS');
script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/25");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_end_attributes();
summary["english"] = "Check for the version of the glibc package";
script_summary(english:summary["english"]);
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.");
family["english"] = "SuSE Local Security Checks";
script_family(english:family["english"]);
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/SuSE/rpm-list");
exit(0);
}
include("rpm.inc");
if ( rpm_check( reference:"glibc-2.2.2-64", release:"SUSE7.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"glibc-devel-2.2.2-64", release:"SUSE7.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"glibc-profile-2.2.2-64", release:"SUSE7.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"glibc-2.2.4-75", release:"SUSE7.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"glibc-devel-2.2.4-75", release:"SUSE7.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"glibc-profile-2.2.4-75", release:"SUSE7.3") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"glibc-2.2.5-123", release:"SUSE8.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"glibc-devel-2.2.5-123", release:"SUSE8.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"glibc-profile-2.2.5-123", release:"SUSE8.0") )
{
security_hole(0);
exit(0);
}
if (rpm_exists(rpm:"glibc-", release:"SUSE7.2")
|| rpm_exists(rpm:"glibc-", release:"SUSE7.3")
|| rpm_exists(rpm:"glibc-", release:"SUSE8.0") )
{
set_kb_item(name:"CVE-2002-0391", value:TRUE);
}
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.85 High
EPSS
Percentile
98.6%