First published: Tue Dec 31 2002(Updated: )
pkgadd in Sun Solaris 2.5.1 through 8 installs files setuid/setgid root if the pkgmap file contains a "?" (question mark) in the (1) mode, (2) owner, or (3) group fields, which allows attackers to elevate privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.7 | |
Sun SunOS | =5.8 | |
Sun SunOS | =5.5.1 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1871 is considered a medium to high severity vulnerability due to the potential for privilege escalation.
To fix CVE-2002-1871, ensure that pkgmap files do not contain a '?' (question mark) in the mode, owner, or group fields.
CVE-2002-1871 affects Sun Solaris versions 2.5.1 through 8, including specific versions 5.5.1, 5.7, and 5.8.
CVE-2002-1871 is a privilege escalation vulnerability related to the pkgadd command.
CVE-2002-1871 requires local access to exploit, as it involves manipulating pkgmap files.