Vulnerability Details : CVE-2003-0465
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
Exploit prediction scoring system (EPSS) score for CVE-2003-0465
Probability of exploitation activity in the next 30 days: 0.22%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 60 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2003-0465
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2003-0465
Products affected by CVE-2003-0465
- cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*