Vulnerabilites related to gnu - fileutils
CVE-2003-0854 (GCVE-0-2003-0854)
Vulnerability from cvelistv5
Published
2003-10-25 04:00
Modified
2024-08-08 02:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:05:12.585Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-705", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-705" }, { "name": "CLA-2003:771", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf" }, { "name": "115", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/115" }, { "name": "CLA-2003:768", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768" }, { "name": "20031022 Fun with /bin/ls, yet still ls better than windows", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html" }, { "name": "RHSA-2003:309", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html" }, { "name": "TLSA-2003-60", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt" }, { "name": "RHSA-2003:310", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html" }, { "name": "IMNX-2003-7+-026-01", "tags": [ "vendor-advisory", "x_refsource_IMMUNIX", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/6014" }, { "name": "17069", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17069" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.guninski.com/binls.html" }, { "name": "10126", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/10126" }, { "name": "MDKSA-2003:106", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-10-22T00:00:00", "descriptions": [ { "lang": "en", "value": "ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-705", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-705" }, { "name": "CLA-2003:771", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf" }, { "name": "115", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/115" }, { "name": "CLA-2003:768", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768" }, { "name": "20031022 Fun with /bin/ls, yet still ls better than windows", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html" }, { "name": "RHSA-2003:309", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html" }, { "name": "TLSA-2003-60", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt" }, { "name": "RHSA-2003:310", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html" }, { "name": "IMNX-2003-7+-026-01", "tags": [ "vendor-advisory", "x_refsource_IMMUNIX" ], "url": "http://www.securityfocus.com/advisories/6014" }, { "name": "17069", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17069" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.guninski.com/binls.html" }, { "name": "10126", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/10126" }, { "name": "MDKSA-2003:106", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0854", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-705", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-705" }, { "name": "CLA-2003:771", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf" }, { "name": "115", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/115" }, { "name": "CLA-2003:768", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768" }, { "name": "20031022 Fun with /bin/ls, yet still ls better than windows", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html" }, { "name": "RHSA-2003:309", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html" }, { "name": "TLSA-2003-60", "refsource": "TURBO", "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt" }, { "name": "RHSA-2003:310", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html" }, { "name": "IMNX-2003-7+-026-01", "refsource": "IMMUNIX", "url": "http://www.securityfocus.com/advisories/6014" }, { "name": "17069", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17069" }, { "name": "http://www.guninski.com/binls.html", "refsource": "MISC", "url": "http://www.guninski.com/binls.html" }, { "name": "10126", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/10126" }, { "name": "MDKSA-2003:106", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0854", "datePublished": "2003-10-25T04:00:00", "dateReserved": "2003-10-10T00:00:00", "dateUpdated": "2024-08-08T02:05:12.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-0853 (GCVE-0-2003-0853)
Vulnerability from cvelistv5
Published
2003-10-25 04:00
Modified
2024-08-08 02:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:05:12.707Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CLA-2003:771", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf" }, { "name": "CLA-2003:768", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768" }, { "name": "20031022 Fun with /bin/ls, yet still ls better than windows", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html" }, { "name": "RHSA-2003:309", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html" }, { "name": "TLSA-2003-60", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt" }, { "name": "RHSA-2003:310", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html" }, { "name": "8875", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/8875" }, { "name": "IMNX-2003-7+-026-01", "tags": [ "vendor-advisory", "x_refsource_IMMUNIX", "x_transferred" ], "url": "http://www.securityfocus.com/advisories/6014" }, { "name": "17069", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17069" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.guninski.com/binls.html" }, { "name": "10126", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/10126" }, { "name": "MDKSA-2003:106", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-10-22T00:00:00", "descriptions": [ { "lang": "en", "value": "An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-10-28T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CLA-2003:771", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf" }, { "name": "CLA-2003:768", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768" }, { "name": "20031022 Fun with /bin/ls, yet still ls better than windows", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html" }, { "name": "RHSA-2003:309", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html" }, { "name": "TLSA-2003-60", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt" }, { "name": "RHSA-2003:310", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html" }, { "name": "8875", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/8875" }, { "name": "IMNX-2003-7+-026-01", "tags": [ "vendor-advisory", "x_refsource_IMMUNIX" ], "url": "http://www.securityfocus.com/advisories/6014" }, { "name": "17069", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17069" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.guninski.com/binls.html" }, { "name": "10126", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/10126" }, { "name": "MDKSA-2003:106", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0853", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CLA-2003:771", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf" }, { "name": "CLA-2003:768", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768" }, { "name": "20031022 Fun with /bin/ls, yet still ls better than windows", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html" }, { "name": "RHSA-2003:309", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html" }, { "name": "TLSA-2003-60", "refsource": "TURBO", "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt" }, { "name": "RHSA-2003:310", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html" }, { "name": "8875", "refsource": "BID", "url": "http://www.securityfocus.com/bid/8875" }, { "name": "IMNX-2003-7+-026-01", "refsource": "IMMUNIX", "url": "http://www.securityfocus.com/advisories/6014" }, { "name": "17069", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17069" }, { "name": "http://www.guninski.com/binls.html", "refsource": "MISC", "url": "http://www.guninski.com/binls.html" }, { "name": "10126", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/10126" }, { "name": "MDKSA-2003:106", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0853", "datePublished": "2003-10-25T04:00:00", "dateReserved": "2003-10-10T00:00:00", "dateUpdated": "2024-08-08T02:05:12.707Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-0435 (GCVE-0-2002-0435)
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 02:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a ".." directory that is higher than expected, possibly up to the root file system.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:49:28.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2003:016", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-016.html" }, { "name": "MDKSA-2002:031", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-031.php" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html" }, { "name": "RHSA-2003:015", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-015.html" }, { "name": "4266", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/4266" }, { "name": "CSSA-2002-018.1", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-018.1.txt" }, { "name": "20020310 GNU fileutils - recursive directory removal race condition", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/260936" }, { "name": "gnu-fileutils-race-condition(8432)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/8432.php" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-03-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a \"..\" directory that is higher than expected, possibly up to the root file system." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2003-03-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2003:016", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-016.html" }, { "name": "MDKSA-2002:031", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-031.php" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html" }, { "name": "RHSA-2003:015", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-015.html" }, { "name": "4266", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/4266" }, { "name": "CSSA-2002-018.1", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-018.1.txt" }, { "name": "20020310 GNU fileutils - recursive directory removal race condition", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/260936" }, { "name": "gnu-fileutils-race-condition(8432)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/8432.php" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a \"..\" directory that is higher than expected, possibly up to the root file system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2003:016", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-016.html" }, { "name": "MDKSA-2002:031", "refsource": "MANDRAKE", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-031.php" }, { "name": "http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html", "refsource": "CONFIRM", "url": "http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html" }, { "name": "RHSA-2003:015", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-015.html" }, { "name": "4266", "refsource": "BID", "url": "http://www.securityfocus.com/bid/4266" }, { "name": "CSSA-2002-018.1", "refsource": "CALDERA", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-018.1.txt" }, { "name": "20020310 GNU fileutils - recursive directory removal race condition", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/260936" }, { "name": "gnu-fileutils-race-condition(8432)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/8432.php" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0435", "datePublished": "2003-04-02T05:00:00", "dateReserved": "2002-06-07T00:00:00", "dateUpdated": "2024-08-08T02:49:28.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2003-11-17 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000768 | ||
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000771 | ||
cve@mitre.org | http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html | ||
cve@mitre.org | http://secunia.com/advisories/10126 | ||
cve@mitre.org | http://secunia.com/advisories/17069 | ||
cve@mitre.org | http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf | ||
cve@mitre.org | http://www.guninski.com/binls.html | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2003:106 | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2003-309.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2003-310.html | ||
cve@mitre.org | http://www.securityfocus.com/advisories/6014 | ||
cve@mitre.org | http://www.securityfocus.com/bid/8875 | Exploit, Patch, Vendor Advisory | |
cve@mitre.org | http://www.turbolinux.com/security/TLSA-2003-60.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000768 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000771 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/10126 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17069 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.guninski.com/binls.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2003:106 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2003-309.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2003-310.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/advisories/6014 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/8875 | Exploit, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.turbolinux.com/security/TLSA-2003-60.txt |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | fileutils | 4.0 | |
gnu | fileutils | 4.0.36 | |
gnu | fileutils | 4.1 | |
gnu | fileutils | 4.1.6 | |
gnu | fileutils | 4.1.7 | |
washington_university | wu-ftpd | 2.4.1 | |
washington_university | wu-ftpd | 2.4.2_beta2 | |
washington_university | wu-ftpd | 2.4.2_beta18 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr4 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr5 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr6 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr7 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr8 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr9 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr10 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr11 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr12 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr13 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr14 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr15 | |
washington_university | wu-ftpd | 2.4.2_vr16 | |
washington_university | wu-ftpd | 2.4.2_vr17 | |
washington_university | wu-ftpd | 2.5.0 | |
washington_university | wu-ftpd | 2.6.0 | |
washington_university | wu-ftpd | 2.6.1 | |
washington_university | wu-ftpd | 2.6.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:fileutils:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5763D60E-A358-4D0A-BD7B-B01CC4CAD7C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:fileutils:4.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "5B1309D6-E5D0-41FB-B7E0-2667EE34C796", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:fileutils:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2F6A8F0-396B-4484-9621-70FFC61BF4A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:fileutils:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "7E2FE284-B564-48C7-9DA4-31A6D9AD3E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:fileutils:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "F0049681-875E-4876-B2E4-519708F2BBBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "28E5257A-F5ED-482C-9A0B-3B576513E7D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta2:*:academ:*:*:*:*:*", "matchCriteriaId": "833542E5-B4E7-4995-95C9-E012AE13902D", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18:*:academ:*:*:*:*:*", "matchCriteriaId": "C63ACBE3-5BB2-483E-A5FE-87698E98354A", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr4:*:*:*:*:*:*:*", "matchCriteriaId": "B39D46C4-B153-4301-AE9C-57FB6BA64CD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr5:*:*:*:*:*:*:*", "matchCriteriaId": "E55582DD-DEF7-4BF8-950C-E7E58BD29DE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr6:*:*:*:*:*:*:*", "matchCriteriaId": "FF9B9132-19A1-4242-A129-E5A49F466EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr7:*:*:*:*:*:*:*", "matchCriteriaId": "4B9E32F3-06CF-482D-8313-3D098CDE8B6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr8:*:*:*:*:*:*:*", "matchCriteriaId": "0A096214-84AD-44F5-BBEF-F9F17B9B0C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*", "matchCriteriaId": "4989799F-143A-45E5-A30C-9E3203649770", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr10:*:*:*:*:*:*:*", "matchCriteriaId": "1E3D0CC6-D1A0-4784-BE93-319C7EE59134", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr11:*:*:*:*:*:*:*", "matchCriteriaId": "4FA32489-F098-43D2-80B7-89CFE0BE9A3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr12:*:*:*:*:*:*:*", "matchCriteriaId": "91C6388E-464B-4562-BC7B-7B4A66387B30", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr13:*:*:*:*:*:*:*", "matchCriteriaId": "923B5711-853D-4A77-8FB3-D5C3D449518D", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr14:*:*:*:*:*:*:*", "matchCriteriaId": "9BB1B136-F90E-426B-8010-F2D059E89DBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr15:*:*:*:*:*:*:*", "matchCriteriaId": "CD9EFCD7-2A13-420E-B6A0-C1248B2E6E2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr16:*:*:*:*:*:*:*", "matchCriteriaId": "573486C8-0349-4BC9-AD7D-3FBF93DDB6AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr17:*:*:*:*:*:*:*", "matchCriteriaId": "CAD81A30-9C35-4EEA-B6FE-A4AC76893AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "473E71DD-F779-4F93-838A-AD6768BB8DFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C5E9B738-E8DF-4FE7-B4A5-91DE46A9CF8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "7196CF2D-8CCC-454A-A2C1-6408A9D636C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "D851CEBD-4FE5-46D9-99BD-CA3F3235B2E6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd." }, { "lang": "es", "value": "Un desbordamiento de enteros en ls en los paquetes fileutils o coreutils puede permitir a usuarios locales causar una denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario mediante un valor -w, lo que podr\u00eda ser explotado remotamente mediante aplicaciones que usan ls, como wu-ftpd." } ], "id": "CVE-2003-0853", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-11-17T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768" }, { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/10126" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/17069" }, { "source": "cve@mitre.org", "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf" }, { "source": "cve@mitre.org", "url": "http://www.guninski.com/binls.html" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/advisories/6014" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/8875" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/10126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/17069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.guninski.com/binls.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/advisories/6014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/8875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2002-07-26 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a ".." directory that is higher than expected, possibly up to the root file system.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-018.1.txt | Patch, Vendor Advisory | |
cve@mitre.org | http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html | ||
cve@mitre.org | http://www.iss.net/security_center/static/8432.php | Patch, Vendor Advisory | |
cve@mitre.org | http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-031.php | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2003-015.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2003-016.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/260936 | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/4266 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-018.1.txt | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.iss.net/security_center/static/8432.php | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-031.php | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2003-015.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2003-016.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/260936 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/4266 | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:fileutils:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5763D60E-A358-4D0A-BD7B-B01CC4CAD7C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:fileutils:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2F6A8F0-396B-4484-9621-70FFC61BF4A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:fileutils:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "7E2FE284-B564-48C7-9DA4-31A6D9AD3E38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a \"..\" directory that is higher than expected, possibly up to the root file system." } ], "id": "CVE-2002-0435", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-07-26T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-018.1.txt" }, { "source": "cve@mitre.org", "url": "http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/8432.php" }, { "source": "cve@mitre.org", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-031.php" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2003-015.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2003-016.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/260936" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4266" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-018.1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.iss.net/security_center/static/8432.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-031.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2003-015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2003-016.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/260936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/4266" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-11-17 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000768 | ||
cve@mitre.org | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000771 | ||
cve@mitre.org | http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html | ||
cve@mitre.org | http://secunia.com/advisories/10126 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/17069 | Vendor Advisory | |
cve@mitre.org | http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf | ||
cve@mitre.org | http://www.debian.org/security/2005/dsa-705 | ||
cve@mitre.org | http://www.guninski.com/binls.html | ||
cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDKSA-2003:106 | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2003-309.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2003-310.html | ||
cve@mitre.org | http://www.securityfocus.com/advisories/6014 | ||
cve@mitre.org | http://www.turbolinux.com/security/TLSA-2003-60.txt | ||
cve@mitre.org | https://www.exploit-db.com/exploits/115 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000768 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000771 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/10126 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/17069 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2005/dsa-705 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.guninski.com/binls.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDKSA-2003:106 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2003-309.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2003-310.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/advisories/6014 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.turbolinux.com/security/TLSA-2003-60.txt | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/115 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gnu | fileutils | 4.0 | |
gnu | fileutils | 4.0.36 | |
gnu | fileutils | 4.1 | |
gnu | fileutils | 4.1.6 | |
gnu | fileutils | 4.1.7 | |
washington_university | wu-ftpd | 2.4.1 | |
washington_university | wu-ftpd | 2.4.2_beta2 | |
washington_university | wu-ftpd | 2.4.2_beta18 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr4 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr5 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr6 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr7 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr8 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr9 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr10 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr11 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr12 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr13 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr14 | |
washington_university | wu-ftpd | 2.4.2_beta18_vr15 | |
washington_university | wu-ftpd | 2.4.2_vr16 | |
washington_university | wu-ftpd | 2.4.2_vr17 | |
washington_university | wu-ftpd | 2.5.0 | |
washington_university | wu-ftpd | 2.6.0 | |
washington_university | wu-ftpd | 2.6.1 | |
washington_university | wu-ftpd | 2.6.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:fileutils:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5763D60E-A358-4D0A-BD7B-B01CC4CAD7C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:fileutils:4.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "5B1309D6-E5D0-41FB-B7E0-2667EE34C796", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:fileutils:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "C2F6A8F0-396B-4484-9621-70FFC61BF4A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:fileutils:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "7E2FE284-B564-48C7-9DA4-31A6D9AD3E38", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnu:fileutils:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "F0049681-875E-4876-B2E4-519708F2BBBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "28E5257A-F5ED-482C-9A0B-3B576513E7D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta2:*:academ:*:*:*:*:*", "matchCriteriaId": "833542E5-B4E7-4995-95C9-E012AE13902D", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18:*:academ:*:*:*:*:*", "matchCriteriaId": "C63ACBE3-5BB2-483E-A5FE-87698E98354A", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr4:*:*:*:*:*:*:*", "matchCriteriaId": "B39D46C4-B153-4301-AE9C-57FB6BA64CD9", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr5:*:*:*:*:*:*:*", "matchCriteriaId": "E55582DD-DEF7-4BF8-950C-E7E58BD29DE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr6:*:*:*:*:*:*:*", "matchCriteriaId": "FF9B9132-19A1-4242-A129-E5A49F466EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr7:*:*:*:*:*:*:*", "matchCriteriaId": "4B9E32F3-06CF-482D-8313-3D098CDE8B6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr8:*:*:*:*:*:*:*", "matchCriteriaId": "0A096214-84AD-44F5-BBEF-F9F17B9B0C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*", "matchCriteriaId": "4989799F-143A-45E5-A30C-9E3203649770", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr10:*:*:*:*:*:*:*", "matchCriteriaId": "1E3D0CC6-D1A0-4784-BE93-319C7EE59134", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr11:*:*:*:*:*:*:*", "matchCriteriaId": "4FA32489-F098-43D2-80B7-89CFE0BE9A3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr12:*:*:*:*:*:*:*", "matchCriteriaId": "91C6388E-464B-4562-BC7B-7B4A66387B30", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr13:*:*:*:*:*:*:*", "matchCriteriaId": "923B5711-853D-4A77-8FB3-D5C3D449518D", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr14:*:*:*:*:*:*:*", "matchCriteriaId": "9BB1B136-F90E-426B-8010-F2D059E89DBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr15:*:*:*:*:*:*:*", "matchCriteriaId": "CD9EFCD7-2A13-420E-B6A0-C1248B2E6E2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr16:*:*:*:*:*:*:*", "matchCriteriaId": "573486C8-0349-4BC9-AD7D-3FBF93DDB6AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr17:*:*:*:*:*:*:*", "matchCriteriaId": "CAD81A30-9C35-4EEA-B6FE-A4AC76893AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "473E71DD-F779-4F93-838A-AD6768BB8DFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C5E9B738-E8DF-4FE7-B4A5-91DE46A9CF8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "7196CF2D-8CCC-454A-A2C1-6408A9D636C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "D851CEBD-4FE5-46D9-99BD-CA3F3235B2E6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd." }, { "lang": "es", "value": "ls en los paquetes fileutils o coreutils permite a usuarios locales consumir una gran cantidad de memoria mediante un valor -w, lo que puede ser explotado remotamente mediante aplicaciones que usan ls, com wu-ftpd." } ], "id": "CVE-2003-0854", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-11-17T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768" }, { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/10126" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17069" }, { "source": "cve@mitre.org", "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2005/dsa-705" }, { "source": "cve@mitre.org", "url": "http://www.guninski.com/binls.html" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/advisories/6014" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/10126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/17069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2005/dsa-705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.guninski.com/binls.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/advisories/6014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/115" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }