
CVE-2003-0876
https://notcve.org/view.php?id=CVE-2003-0876
30 Oct 2003 — Finder in Mac OS X 10.2.8 and earlier sets global read/write/execute permissions on directories when they are dragged (copied) from a mounted volume such as a disk image (DMG), which could cause the directories to have less restrictive permissions than intended. Finder en Mac OS X 10.2.8 y anteriores establece permisos de lectura/escritura/ejecución globales en directorios cuando son arrastrados (copiados) de un volumen montado, como una imagen de disco (DMG), lo que podría causar que los directorios tuvier... • http://www.atstake.com/research/advisories/2003/a102803-1.txt •

CVE-2003-0804
https://notcve.org/view.php?id=CVE-2003-0804
25 Sep 2003 — The arplookup function in FreeBSD 5.1 and earlier, Mac OS X before 10.2.8, and possibly other BSD-based systems, allows remote attackers on a local subnet to cause a denial of service (resource starvation and panic) via a flood of spoofed ARP requests. La función asplookup en FreeBSD 5.1 y anteriores, Max OS X anteriores a 10.2.8, y posiblemente otros sistemas basados en BSD, permite a atacantes remotos en una subred local causar una denegación de servicio (agotamiento de recursos y pánico) mediante una inu... • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:14.arp.asc •

CVE-2003-0694 – Sendmail SMTP Address prescan Memory Corruption
https://notcve.org/view.php?id=CVE-2003-0694
18 Sep 2003 — The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. La función de prescan en Sendmail 8.12.9 permite a atacantes remotos ejecutar código arbitrario mediante ataques de desbordamiento de búfer, como se demostró usando la función parseaddr en parseaddr.c. • https://packetstorm.news/files/id/180502 •

CVE-2003-0681 – Sendmail 8.12.9 - 'Prescan()' Variant Remote Buffer Overrun
https://notcve.org/view.php?id=CVE-2003-0681
18 Sep 2003 — A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences. Un "desbordamiento de búfer potencial en el análisis de reglas" (ruleset parsing) en Sendmail 8.12.9 cuando se usan los conjuntos de reglas no estándar: (1) receptor, (2) final, o (3) receptores de envoltorio específicos del enviador de correo, tienen consecuencias desconocidas. • https://www.exploit-db.com/exploits/23154 •

CVE-2003-0466 – FreeBSD 4.8 - 'realpath()' Off-by-One Buffer Overflow
https://notcve.org/view.php?id=CVE-2003-0466
01 Aug 2003 — Off-by-one error in the fb_realpath() function, as derived from the realpath function in BSD, may allow attackers to execute arbitrary code, as demonstrated in wu-ftpd 2.5.0 through 2.6.2 via commands that cause pathnames of length MAXPATHLEN+1 to trigger a buffer overflow, including (1) STOR, (2) RETR, (3) APPE, (4) DELE, (5) MKD, (6) RMD, (7) STOU, or (8) RNTO. Error de fuera-por-uno (off-by-one) en la función fb_realpath(), derivada de la función realpath de BSD, pude permitir a atacantes ejecutar código... • https://www.exploit-db.com/exploits/22976 • CWE-193: Off-by-one Error •

CVE-2003-0518
https://notcve.org/view.php?id=CVE-2003-0518
10 Jul 2003 — The screen saver in MacOS X allows users with physical access to cause the screen saver to crash and gain access to the underlying session via a large number of characters in the password field, possibly triggering a buffer overflow. El salvapantallas de MacOS X permite a usuarios con acceso físico a la máquina hacer que el salvapantallas se caiga y ganar acceso a la sesión subyacente mediante un número de caracteres largo en el campo de contraseña, posiblemente disparando un desbordamiento de búfer. • http://archives.neohapsis.com/archives/bugtraq/2003-07/0034.html •

CVE-2003-0420
https://notcve.org/view.php?id=CVE-2003-0420
13 Jun 2003 — Information leak in dsimportexport for Apple Macintosh OS X Server 10.2.6 allows local users to obtain the username and password of the account running the tool. • http://secunia.com/advisories/9025 •

CVE-2003-0171 – Apple Mac OSX 10.2.4 - DirectoryService 'PATH' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2003-0171
15 Apr 2003 — DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program. DirectoryServices en MacOS X se fia de la variable de entorno PATH para localizar y ejecutar el comando touch, lo que permite a usurarios locales ejecutar comandos arbitrarios modificando PATH para que apunte a un directorio que contenga un programa 'touch' malicios... • https://www.exploit-db.com/exploits/15 •

CVE-2003-0198
https://notcve.org/view.php?id=CVE-2003-0198
15 Apr 2003 — Mac OS X before 10.2.5 allows guest users to modify the permissions of the DropBox folder and read unauthorized files. Mac OS X anteriores a 10.2.5 permite a usuarios invitados modificar los permisos de la carpeta DropBox y leer ficheros no autorizados. • http://lists.apple.com/mhonarc/security-announce/msg00028.html •

CVE-2003-0049
https://notcve.org/view.php?id=CVE-2003-0049
26 Feb 2003 — Apple File Protocol (AFP) in Mac OS X before 10.2.4 allows administrators to log in as other users by using the administrator password. AFP en Mac OS X anterior a 10.2.4 permite a administradores iniciar sesión como otros usuarios usando la contraseña de administrador. • http://docs.info.apple.com/article.html?artnum=61798 •