First published: Fri Apr 11 2003(Updated: )
Integer signedness error in select() on OpenBSD 3.1 and earlier allows local users to overwrite arbitrary kernel memory via a negative value for the size parameter, which satisfies the boundary check as a signed integer, but is later used as an unsigned integer during a data copying operation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | =3.1 | |
OpenBSD | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1420 is rated as a high-severity vulnerability due to its potential for local users to overwrite kernel memory.
To fix CVE-2002-1420, upgrade to a version of OpenBSD later than 3.1 where the vulnerability has been addressed.
CVE-2002-1420 affects local users of OpenBSD versions 3.1 and earlier.
CVE-2002-1420 is classified as an integer signedness error leading to potential privilege escalation.
Exploiting CVE-2002-1420 could allow a local user to gain elevated privileges by overwriting arbitrary memory in the kernel.