All Threat Alerts
criticalCVE Alert
CVE-2002-0391

Critical Vulnerability: CVE-2002-0391 — freebsd, openbsd — freebsd, openbsd

Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd.

Thursday, April 16, 2026freebsd, openbsdVulnios Threat Intelligence
Share:

Executive Summary

Integer overflow in xdr_array function in RPC servers for operating systems that use libc, glibc, or other code based on SunRPC including dietlibc, allows remote attackers to execute arbitrary code by passing a large number of arguments to xdr_array through RPC services such as rpc.cmsd and dmispd.

Why It Matters

CVE-2002-0391 is rated CRITICAL severity, requiring immediate attention from security teams.

CVSS Base Score: 9.8/10

Affected Technologies

Vendors: freebsd, openbsd, sun, microsoft

Products: freebsd, openbsd, solaris, sunos, windows_2000, windows_nt, windows_xp

🛡️What Defenders Should Check

  • Check if you are affected — Review your asset inventory for products listed in CVE-2002-0391.
  • Apply available patches — Visit vendor advisories for the latest security updates.
  • Monitor for exploitation — Check your SIEM/IDS logs for related indicators.
  • Use Vulnios to continuously monitor your exposure to CVE-2002-0391 and similar vulnerabilities.

    References & Sources

    AI Security Advisor

    Powered by Gemini

    Get AI-powered security recommendations tailored to this specific threat — including risk assessment, detection guidance, MITRE ATT&CK mapping, and actionable remediation steps.

    Affected Products

    freebsdopenbsdsolarissunoswindows_2000windows_ntwindows_xp

    Sources

    critical

    Protect Your Organization

    Monitor CVEs, scan for vulnerabilities, and get real-time threat alerts — all in one platform.

    Get instant alerts on Telegram

    Join our public channel for real-time critical CVE alerts.

    Follow @vulnios