Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2002-2092
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Race condition in exec in OpenBSD 4.0 and earlier, NetBSD 1.5.2 and earlier, and FreeBSD 4.4 and earlier allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
BSD内核exec()系统调用竞争条件漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
NetBSD内核在exec()系统调用的实现中存在竞争条件漏洞,允许本地攻击者提升权限。 exec()系统调用用于将可执行文件二进制映像加载到进程空间中。当进程调用exec()来加载一个setuid的二进制程序时,存在一个竞争条件漏洞。在被加载程序激活前的一个很短的时间段内,攻击者可能获取对它的ptrace控制,然后攻击者就可以修改该setuid进程的地址空间,从而提升自己的权限。如果系统中存在setuid root程序,攻击者就可能获取本地root权限。 其他BSD操作系统可能存在同样的安全问题。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2002-2092
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2002-2092
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2002-2092

No comments yet


Leave a comment