First published: Fri Aug 23 2002(Updated: )
Integer signedness error in several system calls for FreeBSD 4.6.1 RELEASE-p10 and earlier may allow attackers to access sensitive kernel memory via large negative values to the (1) accept, (2) getsockname, and (3) getpeername system calls, and the (4) vesa FBIO_GETPALETTE ioctl.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.1.1-stable | |
FreeBSD Kernel | =4.1.1-release | |
FreeBSD Kernel | =4.4-stable | |
FreeBSD Kernel | =4.6-release | |
FreeBSD Kernel | =4.3-stable | |
FreeBSD Kernel | =4.5-stable | |
FreeBSD Kernel | =4.5-release | |
FreeBSD Kernel | =4.3-release | |
FreeBSD Kernel | =4.2-stable | |
FreeBSD Kernel | =4.5 | |
FreeBSD Kernel | =4.1 | |
FreeBSD Kernel | =4.4 | |
FreeBSD Kernel | =4.2 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =4.1.1 | |
FreeBSD Kernel | =4.6 | |
FreeBSD Kernel | =4.3 | |
FreeBSD Kernel | =4.6.1-release_p10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0973 has a high severity level due to potential access to sensitive kernel memory by attackers.
To fix CVE-2002-0973, upgrade to a patched version of FreeBSD that addresses the signedness error.
CVE-2002-0973 affects FreeBSD versions 4.6.1 RELEASE-p10 and earlier.
Mitigation for CVE-2002-0973 includes applying security patches and conducting regular vulnerability assessments.
Yes, CVE-2002-0973 can potentially be exploited remotely through specific system calls.