CVE-2003-0188
 
Severity Score
7.2
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories.
lv lee un fichero .lv desde el directorio de trabajo actual, lo que permitirÃa que usuarios locales ejecuten comandos arbitrarios como otros usuarios lv (colocando ficheros .lv dentro de otros directorios).
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2003-04-01 CVE Reserved
- 2003-05-17 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A430 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2003/dsa-304 | 2017-10-11 | |
http://www.redhat.com/support/errata/RHSA-2003-169.html | 2017-10-11 |
URL | Date | SRC |
---|---|---|
http://www.redhat.com/support/errata/RHSA-2003-167.html | 2017-10-11 | |
http://www.turbolinux.com/security/TLSA-2003-35.txt | 2017-10-11 | |
https://access.redhat.com/security/cve/CVE-2003-0188 | 2003-06-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1616995 | 2003-06-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Lv Search vendor "Lv" | Lv Search vendor "Lv" for product "Lv" | 4.49.1 Search vendor "Lv" for product "Lv" and version "4.49.1" | - |
Affected
| ||||||
Lv Search vendor "Lv" | Lv Search vendor "Lv" for product "Lv" | 4.49.2 Search vendor "Lv" for product "Lv" and version "4.49.2" | - |
Affected
| ||||||
Lv Search vendor "Lv" | Lv Search vendor "Lv" for product "Lv" | 4.49.3 Search vendor "Lv" for product "Lv" and version "4.49.3" | - |
Affected
| ||||||
Lv Search vendor "Lv" | Lv Search vendor "Lv" for product "Lv" | 4.49.4 Search vendor "Lv" for product "Lv" and version "4.49.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Lv Search vendor "Redhat" for product "Lv" | 4.49.4-1 Search vendor "Redhat" for product "Lv" and version "4.49.4-1" | i386 |
Affected
| ||||||
Redhat Search vendor "Redhat" | Lv Search vendor "Redhat" for product "Lv" | 4.49.4-3 Search vendor "Redhat" for product "Lv" and version "4.49.4-3" | i386 |
Affected
| ||||||
Redhat Search vendor "Redhat" | Lv Search vendor "Redhat" for product "Lv" | 4.49.4-7 Search vendor "Redhat" for product "Lv" and version "4.49.4-7" | i386 |
Affected
| ||||||
Redhat Search vendor "Redhat" | Lv Search vendor "Redhat" for product "Lv" | 4.49.4-9 Search vendor "Redhat" for product "Lv" and version "4.49.4-9" | i386 |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Search vendor "Redhat" for product "Linux" | 7.1 Search vendor "Redhat" for product "Linux" and version "7.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Search vendor "Redhat" for product "Linux" | 7.2 Search vendor "Redhat" for product "Linux" and version "7.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Search vendor "Redhat" for product "Linux" | 7.3 Search vendor "Redhat" for product "Linux" and version "7.3" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Search vendor "Redhat" for product "Linux" | 8.0 Search vendor "Redhat" for product "Linux" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Linux Search vendor "Redhat" for product "Linux" | 9.0 Search vendor "Redhat" for product "Linux" and version "9.0" | i386 |
Affected
|