Executive Summary

Informations
Name CVE-2003-0844 First vendor Publication 2003-11-17
Vendor Cve Last vendor Modification 2024-02-16

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Overall CVSS Score 7.1
Base Score 7.1 Environmental Score 7.1
impact SubScore 5.2 Temporal Score 7.1
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode without the Apache log, allows local users to overwrite arbitrary files via (1) a symlink attack on predictable temporary filenames on Unix systems, or (2) an NTFS hard link on Windows systems when the "Strengthen default permissions of internal system objects" policy is not enabled.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0844

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-59 Improper Link Resolution Before File Access ('Link Following')

Open Source Vulnerability Database (OSVDB)

Id Description
10507 mod_gzip Debug Mode Symlink Arbitrary File Overwrite

mod_gzip contains a flaw that may allow a malicious user to overwrite arbitrary files. The issue is triggered when Apache is running in debug mode. It is possible that the flaw may allow for arbitrary files to be overwritten via a symlink attack on predictable temporary filenames on Unix systems, or an NTFS hard link on Windows systems when the "Strengthen default permissions of internal system objects" policy is not enabled. This would result in a loss of integrity, and/or availability.

Sources (Detail)

Source Url
BUGTRAQ http://marc.info/?l=bugtraq&m=105457180009860&w=2

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2024-02-17 00:28:28
  • Multiple Updates
2021-05-04 12:02:09
  • Multiple Updates
2021-04-22 01:02:16
  • Multiple Updates
2020-05-24 01:01:27
  • Multiple Updates
2020-05-23 00:15:30
  • Multiple Updates
2016-10-18 12:01:14
  • Multiple Updates
2013-05-11 11:53:07
  • Multiple Updates