CVE-2003-0212

handleAccept in rinetd before 0.62 does not properly resize the connection list when it becomes full and sets an array index incorrectly, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large number of connections.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rinetd:rinetd:0.52:*:*:*:*:*:*:*
cpe:2.3:a:rinetd:rinetd:0.61:*:*:*:*:*:*:*

History

20 Nov 2024, 23:44

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=105059298502830&w=2 - () http://marc.info/?l=bugtraq&m=105059298502830&w=2 -
References () http://www.debian.org/security/2003/dsa-289 - Patch, Vendor Advisory () http://www.debian.org/security/2003/dsa-289 - Patch, Vendor Advisory

Information

Published : 2003-05-12 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2003-0212

Mitre link : CVE-2003-0212

CVE.ORG link : CVE-2003-0212


JSON object : View

Products Affected

rinetd

  • rinetd