Vulnerability Details : CVE-2003-0625
Off-by-one error in certain versions of xfstt allows remote attackers to read potentially sensitive memory via a malformed client request in the connection handshake, which leaks the memory in the server's response.
Exploit prediction scoring system (EPSS) score for CVE-2003-0625
Probability of exploitation activity in the next 30 days: 1.26%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 85 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2003-0625
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:P |
10.0
|
4.9
|
NIST |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2003-0625
-
A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.Assigned by: nvd@nist.gov (Primary)
References for CVE-2003-0625
-
http://www.securityfocus.com/bid/8255
Broken Link;Exploit;Third Party Advisory;VDB Entry;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=105941103709264&w=2
'[PAPER]: Address relay fingerprinting.' - MARCExploit;Mailing List
-
http://www.debian.org/security/2003/dsa-360
Debian -- The Universal Operating SystemBroken Link;Patch;Vendor Advisory
-
http://developer.berlios.de/forum/forum.php?forum_id=2819
500 Internal Server ErrorBroken Link
Products affected by CVE-2003-0625
- cpe:2.3:a:hadrons:xfstt:*:*:*:*:*:*:*:*