Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2002-2018
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
sastcpd in SAS/Base 8.0 might allow local users to gain privileges by setting the netencralg environment variable, which causes a segmentation fault.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
SAS SASTCPD破坏内存漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SAS Software提供了对数据分析、报告生成、企业级的信息传递的工具和解决方案,软件有Unix、Linux及Windows下的版本。sastcpd是SAS Software软件架构中的任务生成程序。 sastcpd实现上存在问题,本地攻击者可以对sastcpd进程进行拒绝服务攻击。 如果在sastcpd的运行环境中定义了"netencralg"环境变量,sastcpd会在运行过程中发生段错误,通常段错误是内存遭到破坏引起的。这个漏洞已经在SunOS下得到证实。利用这个问题,也可能执行任意指令,但未经
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2002-2018
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2002-2018
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2002-2018

No comments yet


Leave a comment