CVE-2003-0955

OpenBSD kernel 3.3 and 3.4 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code in 3.4 via a program with an invalid header that is not properly handled by (1) ibcs2_exec.c in the iBCS2 emulation (compat_ibcs2) or (2) exec_elf.c, which leads to a stack-based buffer overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*
cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:45

Type Values Removed Values Added
References () ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/005_exec.patch - Patch () ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/005_exec.patch - Patch
References () http://lists.grok.org.uk/pipermail/full-disclosure/2003-November/013315.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2003-November/013315.html -
References () http://marc.info/?l=openbsd-security-announce&m=106808820119679&w=2 - () http://marc.info/?l=openbsd-security-announce&m=106808820119679&w=2 -
References () http://marc.info/?l=openbsd-security-announce&m=106917441524978&w=2 - () http://marc.info/?l=openbsd-security-announce&m=106917441524978&w=2 -
References () http://www.guninski.com/msuxobsd2.html - Exploit, Vendor Advisory () http://www.guninski.com/msuxobsd2.html - Exploit, Vendor Advisory
References () http://www.openbsd.org/errata33.html - () http://www.openbsd.org/errata33.html -
References () http://www.securityfocus.com/bid/8978 - () http://www.securityfocus.com/bid/8978 -

Information

Published : 2003-12-15 05:00

Updated : 2024-11-20 23:45


NVD link : CVE-2003-0955

Mitre link : CVE-2003-0955

CVE.ORG link : CVE-2003-0955


JSON object : View

Products Affected

openbsd

  • openbsd