First published: Fri May 03 2002(Updated: )
Buffer overflow in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via large command line argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAS Base | =8.0 | |
SAS Base | =8.1 | |
SAS Integration Technologies | =8.0 | |
SAS Integration Technologies | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0219 is considered a high severity vulnerability due to the potential for arbitrary code execution.
To fix CVE-2002-0219, users should upgrade to a patched version of SAS/Base or SAS/Integration Technologies beyond versions 8.1.
Local users running SAS/Base versions 8.0 or 8.1 and SAS/Integration Technologies versions 8.0 or 8.1 are affected by CVE-2002-0219.
CVE-2002-0219 can facilitate local user attacks that exploit buffer overflow vulnerabilities to execute arbitrary code.
While CVE-2002-0219 was reported in 2002, it remains relevant for organizations still using the affected SAS software versions.