Vulnerability Details : CVE-2003-0853
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2003-0853
Probability of exploitation activity in the next 30 days: 0.65%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 79 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2003-0853
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2003-0853
- http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf
- http://www.guninski.com/binls.html
- http://www.redhat.com/support/errata/RHSA-2003-309.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html
- http://www.redhat.com/support/errata/RHSA-2003-310.html
-
http://www.securityfocus.com/bid/8875
Exploit;Patch;Vendor Advisory
- http://www.securityfocus.com/advisories/6014
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000768
- http://www.turbolinux.com/security/TLSA-2003-60.txt
- http://www.mandriva.com/security/advisories?name=MDKSA-2003:106
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000771
Products affected by CVE-2003-0853
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr13:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr14:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr15:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr4:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr10:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr12:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr5:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr8:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr16:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr17:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr11:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr6:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr7:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18:*:academ:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta2:*:academ:*:*:*:*:*
- cpe:2.3:a:gnu:fileutils:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:fileutils:4.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:fileutils:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:fileutils:4.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:gnu:fileutils:4.0.36:*:*:*:*:*:*:*