CVE-2002-0971
Vulnerability from cvelistv5
Published
2002-08-23 04:00
Modified
2024-08-08 03:12
Severity ?
Summary
Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the "Add new clients" dialogue box.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:12:16.453Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "5530",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5530"
          },
          {
            "name": "vnc-win32-messaging-privileges(9979)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9979.php"
          },
          {
            "name": "20020821 Win32 API \u0027shatter\u0027 vulnerability found in VNC-based products",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=102994289123085\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-08-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the \"Add new clients\" dialogue box."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "5530",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5530"
        },
        {
          "name": "vnc-win32-messaging-privileges(9979)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9979.php"
        },
        {
          "name": "20020821 Win32 API \u0027shatter\u0027 vulnerability found in VNC-based products",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=102994289123085\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0971",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the \"Add new clients\" dialogue box."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "5530",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5530"
            },
            {
              "name": "vnc-win32-messaging-privileges(9979)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9979.php"
            },
            {
              "name": "20020821 Win32 API \u0027shatter\u0027 vulnerability found in VNC-based products",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=102994289123085\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0971",
    "datePublished": "2002-08-23T04:00:00",
    "dateReserved": "2002-08-21T00:00:00",
    "dateUpdated": "2024-08-08T03:12:16.453Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2002-0971\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-09-24T04:00:00.000\",\"lastModified\":\"2024-11-20T23:40:17.867\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in VNC, TightVNC, and TridiaVNC allows local users to execute arbitrary code as LocalSystem by using the Win32 Messaging System to bypass the VNC GUI and access the \\\"Add new clients\\\" dialogue box.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en VNC, TightVNC, y TridiaVNC permite a usuarios locales ejecutar c\u00f3digo arbitrario como LocalSystem usando el sistema de mensajes de Win32 para evitar el GUI (Interfaz Gr\u00e1fico de \u00dasuario) y acceder al cuadro de di\u00e1logo \\\"A\u00f1adir nuevos clientes\\\"\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:att:winvnc_server:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.3_r9\",\"matchCriteriaId\":\"3CA6820A-D28A-49C6-A6D6-D54F95274FE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:att:winvnc_server:3.3.3_r7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FEAAE30-8DA0-4C04-B745-FECCEA0685ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tightvnc:tightvnc:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2F4EE57-DA68-4438-A401-BAC82B7242D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tightvnc:tightvnc:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9E11A57-016E-4720-A266-A53743629CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tightvnc:tightvnc:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FD5B03E-D897-4A06-A3EF-62B13B46B7EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tridia:tridiavnc:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1E2C09A-A649-4E4C-BC75-45F456546B72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tridia:tridiavnc:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39675379-9A88-40AE-85A1-F0E4ADEA1A17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tridia:tridiavnc:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40879BF2-41EB-4170-A7EC-223CB22A83ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:tridia:tridiavnc:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13622F73-D0BF-41DD-976F-4926FA5744CC\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=bugtraq\u0026m=102994289123085\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/9979.php\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/5530\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=102994289123085\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/9979.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/5530\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.