First published: Mon Dec 23 2002(Updated: )
Directory traversal vulnerability in priocntl system call in Solaris does allows local users to execute arbitrary code via ".." sequences in the pc_clname field of a pcinfo_t structure, which cause priocntl to load a malicious kernel module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.7 | |
Sun SunOS | =5.8 | |
Oracle Solaris and Zettabyte File System (ZFS) | =7.0 | |
Oracle Solaris and Zettabyte File System (ZFS) | =9.0 | |
Sun SunOS | =5.5.1 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.6 | |
Oracle Solaris and Zettabyte File System (ZFS) | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1296 is considered a critical vulnerability due to its potential to allow local users to execute arbitrary code.
To fix CVE-2002-1296, upgrade to a patched version of Solaris that addresses this vulnerability.
CVE-2002-1296 affects local users on Solaris systems, specifically versions 5.5.1 through 9.0.
CVE-2002-1296 can be exploited to execute arbitrary code by leveraging directory traversal in the priocntl system call.
The systems vulnerable to CVE-2002-1296 include various versions of SunOS and Solaris, particularly versions 2.6, 5.5.1, 5.7, 5.8, 7.0, 8.0, and 9.0.