Vulnerability Details : CVE-2003-0972
Integer signedness error in ansi.c for GNU screen 4.0.1 and earlier, and 3.9.15 and earlier, allows local users to execute arbitrary code via a large number of ";" (semicolon) characters in escape sequences, which leads to a buffer overflow.
Vulnerability category: OverflowExecute code
Products affected by CVE-2003-0972
- cpe:2.3:a:gnu:screen:3.9.11:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:screen:3.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:screen:3.9.10:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:screen:3.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:screen:3.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:screen:3.9.15:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:screen:3.9.13:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:screen:4.0.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2003-0972
0.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0972
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2003-0972
-
http://marc.info/?l=bugtraq&m=106995837813873&w=2
'GNU screen buffer overflow' - MARC
-
http://www.debian.org/security/2004/dsa-408
Debian -- The Universal Operating SystemPatch;Vendor Advisory
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000809
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)
-
http://www.mandriva.com/security/advisories?name=MDKSA-2003:113
Mandriva
-
http://groups.yahoo.com/group/gnu-screen/message/3118
Yahoo | Mail, Weather, Search, Politics, News, Finance, Sports & Videos
Jump to