Overview
A locally exploitable buffer overflow exists in all versions of OpenBSD.
Description
| The buffer overflow exists in the select(2) system call. The overflow occurs if select is supplied with arbitrary negative values. | 
Impact
| Local users can gain system privileges and execute code in the context of the kernel. | 
Solution
| From the OpenBSD Security Advisory: "Apply one of the supplied kernel patches or update to 3.0-stable or 3.1-stable from 2002-08-11 17:00 EDT or later." | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
Thanks to Niels Provos for reporting this vulnerability.
This document was written by Ian A Finlay.
Other Information
| CVE IDs: | CVE-2002-1420 | 
| Severity Metric: | 18.00 | 
| Date Public: | 2002-08-11 | 
| Date First Published: | 2002-08-15 | 
| Date Last Updated: | 2002-12-13 13:33 UTC | 
| Document Revision: | 8 |