Vulnerability Details : CVE-2003-1023
Stack-based buffer overflow in vfs_s_resolve_symlink of vfs/direntry.c for Midnight Commander (mc) 4.6.0 and earlier, and possibly later versions, allows remote attackers to execute arbitrary code during symlink conversion.
Vulnerability category: OverflowExecute code
Products affected by CVE-2003-1023
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.52:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.5.55:*:*:*:*:*:*:*
- cpe:2.3:a:midnight_commander:midnight_commander:4.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2003-1023
13.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-1023
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2003-1023
-
http://security.gentoo.org/glsa/glsa-200403-09.xml
Buffer overflow in Midnight Commander (GLSA 200403-09) — Gentoo securityVendor Advisory
-
http://www.redhat.com/archives/fedora-legacy-announce/2004-May/msg00002.html
404 Not Found
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000833
CONECTIVA | Análises dos Melhores Produtos Online (#10 Melhores)
-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-014.0.txt
-
http://archive.cert.uni-stuttgart.de/bugtraq/2003/09/msg00309.html
Stabsstelle Informationssicherheit (RUS-CERT) | Universität Stuttgart
-
http://www.mandriva.com/security/advisories?name=MDKSA-2004:007
Mandriva
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/13247
-
http://www.securityfocus.com/bid/8658
Vendor Advisory
-
http://rhn.redhat.com/errata/RHSA-2004-034.html
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A822
404 Not Found
-
ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc
-
ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc
-
http://fedoranews.org/updates/FEDORA-2004-058.shtml
FedoraNEWS.ORG
-
http://marc.info/?l=bugtraq&m=108118433222764&w=2
'[OpenPKG-SA-2004.009] OpenPKG Security Advisory (mc)' - MARC
-
http://www.debian.org/security/2004/dsa-424
Debian -- The Universal Operating System
-
http://rhn.redhat.com/errata/RHSA-2004-035.html
RHSA-2004:035 - Security Advisory - Red Hat Customer Portal
Jump to