7.2
CVE-2003-0671
- EPSS 0.06%
- Veröffentlicht 27.08.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Format string vulnerability in tcpflow, when used in a setuid context, allows local users to execute arbitrary code via the device name argument, as demonstrated in Sustworks IPNetSentryX and IPNetMonitorX the setuid program RunTCPFlow.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Jeremy Elson ≫ Tcpflow Version0.10
Jeremy Elson ≫ Tcpflow Version0.11
Jeremy Elson ≫ Tcpflow Version0.12
Jeremy Elson ≫ Tcpflow Version0.20
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.158 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|