Vulnerability Details : CVE-2003-0853
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2003-0853
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr13:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr14:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr15:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr4:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr10:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr12:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr5:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr8:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr16:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr17:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr11:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr6:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr7:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18:*:academ:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta2:*:academ:*:*:*:*:*
- cpe:2.3:a:gnu:fileutils:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:fileutils:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:fileutils:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:fileutils:4.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:fileutils:4.0.36:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2003-0853
0.65%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0853
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2003-0853
-
http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf
-
http://www.guninski.com/binls.html
Fun with /bin/ls, yet still ls better than windows
-
http://www.redhat.com/support/errata/RHSA-2003-309.html
Support
-
http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html
[Full-Disclosure] Mailing List Charter
-
http://www.redhat.com/support/errata/RHSA-2003-310.html
Support
-
http://www.securityfocus.com/bid/8875
Exploit;Patch;Vendor Advisory
-
http://www.securityfocus.com/advisories/6014
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000768
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)
-
http://www.turbolinux.com/security/TLSA-2003-60.txt
404 Not Found
-
http://www.mandriva.com/security/advisories?name=MDKSA-2003:106
Mandriva
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000771
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)
Jump to