CVE-2003-0671

Format string vulnerability in tcpflow, when used in a setuid context, allows local users to execute arbitrary code via the device name argument, as demonstrated in Sustworks IPNetSentryX and IPNetMonitorX the setuid program RunTCPFlow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jeremy_elson:tcpflow:0.10:*:*:*:*:*:*:*
cpe:2.3:a:jeremy_elson:tcpflow:0.11:*:*:*:*:*:*:*
cpe:2.3:a:jeremy_elson:tcpflow:0.12:*:*:*:*:*:*:*
cpe:2.3:a:jeremy_elson:tcpflow:0.20:*:*:*:*:*:*:*

History

20 Nov 2024, 23:45

Type Values Removed Values Added
References () http://www.atstake.com/research/advisories/2003/a080703-1.txt - Exploit, Patch, Vendor Advisory () http://www.atstake.com/research/advisories/2003/a080703-1.txt - Exploit, Patch, Vendor Advisory
References () http://www.atstake.com/research/advisories/2003/a080703-2.txt - () http://www.atstake.com/research/advisories/2003/a080703-2.txt -

Information

Published : 2003-08-27 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2003-0671

Mitre link : CVE-2003-0671

CVE.ORG link : CVE-2003-0671


JSON object : View

Products Affected

jeremy_elson

  • tcpflow