7.2
CVE-2003-0671
- EPSS 0.06%
- Veröffentlicht 27.08.2003 04:00:00
- Zuletzt bearbeitet 16.04.2026 00:27:16
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Format string vulnerability in tcpflow, when used in a setuid context, allows local users to execute arbitrary code via the device name argument, as demonstrated in Sustworks IPNetSentryX and IPNetMonitorX the setuid program RunTCPFlow.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Jeremy Elson ≫ Tcpflow Version0.10
Jeremy Elson ≫ Tcpflow Version0.11
Jeremy Elson ≫ Tcpflow Version0.12
Jeremy Elson ≫ Tcpflow Version0.20
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.158 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|