Vulnerability Details : CVE-2003-0041
Kerberos FTP client allows remote FTP sites to execute arbitrary code via a pipe (|) character in a filename that is retrieved by the client.
Vulnerability category: Execute code
Products affected by CVE-2003-0041
- cpe:2.3:o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:mit:kerberos_ftp_client:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2003-0041
0.75%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0041
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2003-0041
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2003-0041
-
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0047.html
Broken Link
-
http://www.mandriva.com/security/advisories?name=MDKSA-2003:021
Advisories - Mandriva LinuxThird Party Advisory
-
http://secunia.com/advisories/7979
About Secunia Research | FlexeraBroken Link
-
http://secunia.com/advisories/8114
About Secunia Research | FlexeraBroken Link
-
http://www.redhat.com/support/errata/RHSA-2003-020.html
SupportBroken Link;Patch;Vendor Advisory
Jump to