Vulnerabilites related to gnu - fileutils
CVE-2003-0854 (GCVE-0-2003-0854)
Vulnerability from cvelistv5
Published
2003-10-25 04:00
Modified
2024-08-08 02:05
Severity ?
CWE
  • n/a
Summary
ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.
References
http://www.debian.org/security/2005/dsa-705 vendor-advisory, x_refsource_DEBIAN
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000771 vendor-advisory, x_refsource_CONECTIVA
http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf x_refsource_CONFIRM
https://www.exploit-db.com/exploits/115 exploit, x_refsource_EXPLOIT-DB
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000768 vendor-advisory, x_refsource_CONECTIVA
http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html mailing-list, x_refsource_FULLDISC
http://www.redhat.com/support/errata/RHSA-2003-309.html vendor-advisory, x_refsource_REDHAT
http://www.turbolinux.com/security/TLSA-2003-60.txt vendor-advisory, x_refsource_TURBO
http://www.redhat.com/support/errata/RHSA-2003-310.html vendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/advisories/6014 vendor-advisory, x_refsource_IMMUNIX
http://secunia.com/advisories/17069 third-party-advisory, x_refsource_SECUNIA
http://www.guninski.com/binls.html x_refsource_MISC
http://secunia.com/advisories/10126 third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2003:106 vendor-advisory, x_refsource_MANDRAKE
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:05:12.585Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-705",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-705"
          },
          {
            "name": "CLA-2003:771",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf"
          },
          {
            "name": "115",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/115"
          },
          {
            "name": "CLA-2003:768",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768"
          },
          {
            "name": "20031022 Fun with /bin/ls, yet still ls better than windows",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html"
          },
          {
            "name": "RHSA-2003:309",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html"
          },
          {
            "name": "TLSA-2003-60",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt"
          },
          {
            "name": "RHSA-2003:310",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html"
          },
          {
            "name": "IMNX-2003-7+-026-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_IMMUNIX",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/advisories/6014"
          },
          {
            "name": "17069",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17069"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.guninski.com/binls.html"
          },
          {
            "name": "10126",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/10126"
          },
          {
            "name": "MDKSA-2003:106",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-10-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-705",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-705"
        },
        {
          "name": "CLA-2003:771",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf"
        },
        {
          "name": "115",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/115"
        },
        {
          "name": "CLA-2003:768",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768"
        },
        {
          "name": "20031022 Fun with /bin/ls, yet still ls better than windows",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html"
        },
        {
          "name": "RHSA-2003:309",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html"
        },
        {
          "name": "TLSA-2003-60",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt"
        },
        {
          "name": "RHSA-2003:310",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html"
        },
        {
          "name": "IMNX-2003-7+-026-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_IMMUNIX"
          ],
          "url": "http://www.securityfocus.com/advisories/6014"
        },
        {
          "name": "17069",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17069"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.guninski.com/binls.html"
        },
        {
          "name": "10126",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/10126"
        },
        {
          "name": "MDKSA-2003:106",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0854",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-705",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-705"
            },
            {
              "name": "CLA-2003:771",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf"
            },
            {
              "name": "115",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/115"
            },
            {
              "name": "CLA-2003:768",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768"
            },
            {
              "name": "20031022 Fun with /bin/ls, yet still ls better than windows",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html"
            },
            {
              "name": "RHSA-2003:309",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html"
            },
            {
              "name": "TLSA-2003-60",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt"
            },
            {
              "name": "RHSA-2003:310",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html"
            },
            {
              "name": "IMNX-2003-7+-026-01",
              "refsource": "IMMUNIX",
              "url": "http://www.securityfocus.com/advisories/6014"
            },
            {
              "name": "17069",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17069"
            },
            {
              "name": "http://www.guninski.com/binls.html",
              "refsource": "MISC",
              "url": "http://www.guninski.com/binls.html"
            },
            {
              "name": "10126",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/10126"
            },
            {
              "name": "MDKSA-2003:106",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0854",
    "datePublished": "2003-10-25T04:00:00",
    "dateReserved": "2003-10-10T00:00:00",
    "dateUpdated": "2024-08-08T02:05:12.585Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-0853 (GCVE-0-2003-0853)
Vulnerability from cvelistv5
Published
2003-10-25 04:00
Modified
2024-08-08 02:05
Severity ?
CWE
  • n/a
Summary
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
References
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000771 vendor-advisory, x_refsource_CONECTIVA
http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf x_refsource_CONFIRM
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000768 vendor-advisory, x_refsource_CONECTIVA
http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html mailing-list, x_refsource_FULLDISC
http://www.redhat.com/support/errata/RHSA-2003-309.html vendor-advisory, x_refsource_REDHAT
http://www.turbolinux.com/security/TLSA-2003-60.txt vendor-advisory, x_refsource_TURBO
http://www.redhat.com/support/errata/RHSA-2003-310.html vendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/8875 vdb-entry, x_refsource_BID
http://www.securityfocus.com/advisories/6014 vendor-advisory, x_refsource_IMMUNIX
http://secunia.com/advisories/17069 third-party-advisory, x_refsource_SECUNIA
http://www.guninski.com/binls.html x_refsource_MISC
http://secunia.com/advisories/10126 third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDKSA-2003:106 vendor-advisory, x_refsource_MANDRAKE
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:05:12.707Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "CLA-2003:771",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf"
          },
          {
            "name": "CLA-2003:768",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768"
          },
          {
            "name": "20031022 Fun with /bin/ls, yet still ls better than windows",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html"
          },
          {
            "name": "RHSA-2003:309",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html"
          },
          {
            "name": "TLSA-2003-60",
            "tags": [
              "vendor-advisory",
              "x_refsource_TURBO",
              "x_transferred"
            ],
            "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt"
          },
          {
            "name": "RHSA-2003:310",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html"
          },
          {
            "name": "8875",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/8875"
          },
          {
            "name": "IMNX-2003-7+-026-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_IMMUNIX",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/advisories/6014"
          },
          {
            "name": "17069",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17069"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.guninski.com/binls.html"
          },
          {
            "name": "10126",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/10126"
          },
          {
            "name": "MDKSA-2003:106",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-10-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2003-10-28T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "CLA-2003:771",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf"
        },
        {
          "name": "CLA-2003:768",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768"
        },
        {
          "name": "20031022 Fun with /bin/ls, yet still ls better than windows",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html"
        },
        {
          "name": "RHSA-2003:309",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html"
        },
        {
          "name": "TLSA-2003-60",
          "tags": [
            "vendor-advisory",
            "x_refsource_TURBO"
          ],
          "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt"
        },
        {
          "name": "RHSA-2003:310",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html"
        },
        {
          "name": "8875",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/8875"
        },
        {
          "name": "IMNX-2003-7+-026-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_IMMUNIX"
          ],
          "url": "http://www.securityfocus.com/advisories/6014"
        },
        {
          "name": "17069",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17069"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.guninski.com/binls.html"
        },
        {
          "name": "10126",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/10126"
        },
        {
          "name": "MDKSA-2003:106",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0853",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "CLA-2003:771",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf"
            },
            {
              "name": "CLA-2003:768",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768"
            },
            {
              "name": "20031022 Fun with /bin/ls, yet still ls better than windows",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html"
            },
            {
              "name": "RHSA-2003:309",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html"
            },
            {
              "name": "TLSA-2003-60",
              "refsource": "TURBO",
              "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt"
            },
            {
              "name": "RHSA-2003:310",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html"
            },
            {
              "name": "8875",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/8875"
            },
            {
              "name": "IMNX-2003-7+-026-01",
              "refsource": "IMMUNIX",
              "url": "http://www.securityfocus.com/advisories/6014"
            },
            {
              "name": "17069",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17069"
            },
            {
              "name": "http://www.guninski.com/binls.html",
              "refsource": "MISC",
              "url": "http://www.guninski.com/binls.html"
            },
            {
              "name": "10126",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/10126"
            },
            {
              "name": "MDKSA-2003:106",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0853",
    "datePublished": "2003-10-25T04:00:00",
    "dateReserved": "2003-10-10T00:00:00",
    "dateUpdated": "2024-08-08T02:05:12.707Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-0435 (GCVE-0-2002-0435)
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 02:49
Severity ?
CWE
  • n/a
Summary
Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a ".." directory that is higher than expected, possibly up to the root file system.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:49:28.518Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2003:016",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-016.html"
          },
          {
            "name": "MDKSA-2002:031",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-031.php"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html"
          },
          {
            "name": "RHSA-2003:015",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-015.html"
          },
          {
            "name": "4266",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4266"
          },
          {
            "name": "CSSA-2002-018.1",
            "tags": [
              "vendor-advisory",
              "x_refsource_CALDERA",
              "x_transferred"
            ],
            "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-018.1.txt"
          },
          {
            "name": "20020310 GNU fileutils - recursive directory removal race condition",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/260936"
          },
          {
            "name": "gnu-fileutils-race-condition(8432)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/8432.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-03-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a \"..\" directory that is higher than expected, possibly up to the root file system."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2003-03-21T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "RHSA-2003:016",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-016.html"
        },
        {
          "name": "MDKSA-2002:031",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-031.php"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html"
        },
        {
          "name": "RHSA-2003:015",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-015.html"
        },
        {
          "name": "4266",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4266"
        },
        {
          "name": "CSSA-2002-018.1",
          "tags": [
            "vendor-advisory",
            "x_refsource_CALDERA"
          ],
          "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-018.1.txt"
        },
        {
          "name": "20020310 GNU fileutils - recursive directory removal race condition",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/260936"
        },
        {
          "name": "gnu-fileutils-race-condition(8432)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/8432.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0435",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a \"..\" directory that is higher than expected, possibly up to the root file system."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "RHSA-2003:016",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-016.html"
            },
            {
              "name": "MDKSA-2002:031",
              "refsource": "MANDRAKE",
              "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-031.php"
            },
            {
              "name": "http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html",
              "refsource": "CONFIRM",
              "url": "http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html"
            },
            {
              "name": "RHSA-2003:015",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-015.html"
            },
            {
              "name": "4266",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4266"
            },
            {
              "name": "CSSA-2002-018.1",
              "refsource": "CALDERA",
              "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-018.1.txt"
            },
            {
              "name": "20020310 GNU fileutils - recursive directory removal race condition",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/260936"
            },
            {
              "name": "gnu-fileutils-race-condition(8432)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/8432.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0435",
    "datePublished": "2003-04-02T05:00:00",
    "dateReserved": "2002-06-07T00:00:00",
    "dateUpdated": "2024-08-08T02:49:28.518Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2003-11-17 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000768
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000771
cve@mitre.orghttp://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html
cve@mitre.orghttp://secunia.com/advisories/10126
cve@mitre.orghttp://secunia.com/advisories/17069
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf
cve@mitre.orghttp://www.guninski.com/binls.html
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2003:106
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-309.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-310.html
cve@mitre.orghttp://www.securityfocus.com/advisories/6014
cve@mitre.orghttp://www.securityfocus.com/bid/8875Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://www.turbolinux.com/security/TLSA-2003-60.txt
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000768
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000771
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/10126
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17069
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf
af854a3a-2127-422b-91ae-364da2661108http://www.guninski.com/binls.html
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2003:106
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-309.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-310.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/6014
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/8875Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.com/security/TLSA-2003-60.txt



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5763D60E-A358-4D0A-BD7B-B01CC4CAD7C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B1309D6-E5D0-41FB-B7E0-2667EE34C796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2F6A8F0-396B-4484-9621-70FFC61BF4A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E2FE284-B564-48C7-9DA4-31A6D9AD3E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0049681-875E-4876-B2E4-519708F2BBBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E5257A-F5ED-482C-9A0B-3B576513E7D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta2:*:academ:*:*:*:*:*",
              "matchCriteriaId": "833542E5-B4E7-4995-95C9-E012AE13902D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18:*:academ:*:*:*:*:*",
              "matchCriteriaId": "C63ACBE3-5BB2-483E-A5FE-87698E98354A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B39D46C4-B153-4301-AE9C-57FB6BA64CD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55582DD-DEF7-4BF8-950C-E7E58BD29DE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF9B9132-19A1-4242-A129-E5A49F466EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9E32F3-06CF-482D-8313-3D098CDE8B6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A096214-84AD-44F5-BBEF-F9F17B9B0C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4989799F-143A-45E5-A30C-9E3203649770",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E3D0CC6-D1A0-4784-BE93-319C7EE59134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FA32489-F098-43D2-80B7-89CFE0BE9A3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr12:*:*:*:*:*:*:*",
              "matchCriteriaId": "91C6388E-464B-4562-BC7B-7B4A66387B30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr13:*:*:*:*:*:*:*",
              "matchCriteriaId": "923B5711-853D-4A77-8FB3-D5C3D449518D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr14:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB1B136-F90E-426B-8010-F2D059E89DBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr15:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9EFCD7-2A13-420E-B6A0-C1248B2E6E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr16:*:*:*:*:*:*:*",
              "matchCriteriaId": "573486C8-0349-4BC9-AD7D-3FBF93DDB6AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr17:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD81A30-9C35-4EEA-B6FE-A4AC76893AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "473E71DD-F779-4F93-838A-AD6768BB8DFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E9B738-E8DF-4FE7-B4A5-91DE46A9CF8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7196CF2D-8CCC-454A-A2C1-6408A9D636C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D851CEBD-4FE5-46D9-99BD-CA3F3235B2E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de enteros en ls en los paquetes fileutils o coreutils puede permitir a usuarios locales causar una denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario mediante un valor -w, lo que podr\u00eda ser explotado remotamente mediante aplicaciones que usan ls, como wu-ftpd."
    }
  ],
  "id": "CVE-2003-0853",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-11-17T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/10126"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/17069"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.guninski.com/binls.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/advisories/6014"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/8875"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/10126"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/17069"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.guninski.com/binls.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/advisories/6014"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/8875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-07-26 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a ".." directory that is higher than expected, possibly up to the root file system.
Impacted products
Vendor Product Version
gnu fileutils 4.0
gnu fileutils 4.1
gnu fileutils 4.1.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5763D60E-A358-4D0A-BD7B-B01CC4CAD7C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2F6A8F0-396B-4484-9621-70FFC61BF4A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E2FE284-B564-48C7-9DA4-31A6D9AD3E38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Race condition in the recursive (1) directory deletion and (2) directory move in GNU File Utilities (fileutils) 4.1 and earlier allows local users to delete directories as the user running fileutils by moving a low-level directory to a higher level as it is being deleted, which causes fileutils to chdir to a \"..\" directory that is higher than expected, possibly up to the root file system."
    }
  ],
  "id": "CVE-2002-0435",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 1.2,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 1.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-07-26T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-018.1.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/8432.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-031.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-015.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-016.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/260936"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4266"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-018.1.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mail.gnu.org/archive/html/bug-fileutils/2002-03/msg00028.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/8432.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-031.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/260936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4266"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2003-11-17 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000768
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000771
cve@mitre.orghttp://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html
cve@mitre.orghttp://secunia.com/advisories/10126Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17069Vendor Advisory
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf
cve@mitre.orghttp://www.debian.org/security/2005/dsa-705
cve@mitre.orghttp://www.guninski.com/binls.html
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2003:106
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-309.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-310.html
cve@mitre.orghttp://www.securityfocus.com/advisories/6014
cve@mitre.orghttp://www.turbolinux.com/security/TLSA-2003-60.txt
cve@mitre.orghttps://www.exploit-db.com/exploits/115
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000768
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000771
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/10126Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17069Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-705
af854a3a-2127-422b-91ae-364da2661108http://www.guninski.com/binls.html
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2003:106
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-309.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-310.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/6014
af854a3a-2127-422b-91ae-364da2661108http://www.turbolinux.com/security/TLSA-2003-60.txt
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/115



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5763D60E-A358-4D0A-BD7B-B01CC4CAD7C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B1309D6-E5D0-41FB-B7E0-2667EE34C796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2F6A8F0-396B-4484-9621-70FFC61BF4A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E2FE284-B564-48C7-9DA4-31A6D9AD3E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:gnu:fileutils:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0049681-875E-4876-B2E4-519708F2BBBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "28E5257A-F5ED-482C-9A0B-3B576513E7D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta2:*:academ:*:*:*:*:*",
              "matchCriteriaId": "833542E5-B4E7-4995-95C9-E012AE13902D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18:*:academ:*:*:*:*:*",
              "matchCriteriaId": "C63ACBE3-5BB2-483E-A5FE-87698E98354A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B39D46C4-B153-4301-AE9C-57FB6BA64CD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55582DD-DEF7-4BF8-950C-E7E58BD29DE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF9B9132-19A1-4242-A129-E5A49F466EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B9E32F3-06CF-482D-8313-3D098CDE8B6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr8:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A096214-84AD-44F5-BBEF-F9F17B9B0C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4989799F-143A-45E5-A30C-9E3203649770",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E3D0CC6-D1A0-4784-BE93-319C7EE59134",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FA32489-F098-43D2-80B7-89CFE0BE9A3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr12:*:*:*:*:*:*:*",
              "matchCriteriaId": "91C6388E-464B-4562-BC7B-7B4A66387B30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr13:*:*:*:*:*:*:*",
              "matchCriteriaId": "923B5711-853D-4A77-8FB3-D5C3D449518D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr14:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB1B136-F90E-426B-8010-F2D059E89DBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr15:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9EFCD7-2A13-420E-B6A0-C1248B2E6E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr16:*:*:*:*:*:*:*",
              "matchCriteriaId": "573486C8-0349-4BC9-AD7D-3FBF93DDB6AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr17:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAD81A30-9C35-4EEA-B6FE-A4AC76893AC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "473E71DD-F779-4F93-838A-AD6768BB8DFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5E9B738-E8DF-4FE7-B4A5-91DE46A9CF8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7196CF2D-8CCC-454A-A2C1-6408A9D636C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:washington_university:wu-ftpd:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D851CEBD-4FE5-46D9-99BD-CA3F3235B2E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd."
    },
    {
      "lang": "es",
      "value": "ls en los paquetes fileutils o coreutils permite a usuarios locales consumir una gran cantidad de memoria mediante un valor -w, lo que puede ser explotado remotamente mediante aplicaciones que usan ls, com wu-ftpd."
    }
  ],
  "id": "CVE-2003-0854",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-11-17T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/10126"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17069"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-705"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.guninski.com/binls.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/advisories/6014"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000768"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000771"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/10126"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17069"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-213.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.guninski.com/binls.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:106"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-309.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-310.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/advisories/6014"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.turbolinux.com/security/TLSA-2003-60.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/115"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}