First published: Tue Dec 31 2002(Updated: )
The setitimer(2) system call in OpenBSD 2.0 through 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | =2.8 | |
OpenBSD | =3.1 | |
OpenBSD | =2.9 | |
OpenBSD | =2.1 | |
OpenBSD | =2.2 | |
OpenBSD | =2.0 | |
OpenBSD | =2.7 | |
OpenBSD | =2.4 | |
OpenBSD | =3.0 | |
OpenBSD | =2.6 | |
OpenBSD | =2.5 | |
OpenBSD | =2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2180 is considered a high severity vulnerability due to its potential to allow local users to write to kernel memory and gain root privileges.
To fix CVE-2002-2180, users should upgrade to a version of OpenBSD that is not affected by this vulnerability.
CVE-2002-2180 affects OpenBSD versions from 2.0 through 3.1.
CVE-2002-2180 enables local users to exploit a signedness error to manipulate kernel memory.
CVE-2002-2180 is a local vulnerability, which requires local access to the system to exploit.