Vulnerability Details : CVE-2003-0955
OpenBSD kernel 3.3 and 3.4 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code in 3.4 via a program with an invalid header that is not properly handled by (1) ibcs2_exec.c in the iBCS2 emulation (compat_ibcs2) or (2) exec_elf.c, which leads to a stack-based buffer overflow.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2003-0955
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ % EPSS Score History EPSS FAQ
CVSS scores for CVE-2003-0955
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.6
|
MEDIUM | AV:L/AC:L/Au:N/C:P/I:P/A:P |
3.9
|
6.4
|
NIST |
References for CVE-2003-0955
-
http://marc.info/?l=openbsd-security-announce&m=106808820119679&w=2
-
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/005_exec.patch
Patch
-
http://www.securityfocus.com/bid/8978
- http://www.openbsd.org/errata33.html
-
http://lists.grok.org.uk/pipermail/full-disclosure/2003-November/013315.html
-
http://www.guninski.com/msuxobsd2.html
Exploit;Vendor Advisory
-
http://marc.info/?l=openbsd-security-announce&m=106917441524978&w=2
Products affected by CVE-2003-0955
- cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*
- cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*