Lucene search

K
cve[email protected]CVE-2003-0671
HistoryOct 03, 2022 - 4:15 p.m.

CVE-2003-0671

2022-10-0316:15:46
web.nvd.nist.gov
28
cve-2003-0671
tcpflow
format string vulnerability
local execution
arbitrary code
device name argument
sustworks ipnetsentryx
ipnetmonitorx
nvd

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

0.4%

Format string vulnerability in tcpflow, when used in a setuid context, allows local users to execute arbitrary code via the device name argument, as demonstrated in Sustworks IPNetSentryX and IPNetMonitorX the setuid program RunTCPFlow.

Affected configurations

NVD
Node
jeremy_elsontcpflowMatch0.10
OR
jeremy_elsontcpflowMatch0.11
OR
jeremy_elsontcpflowMatch0.12
OR
jeremy_elsontcpflowMatch0.20

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.6 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

0.4%

Related for CVE-2003-0671