Executive Summary

Informations
Name CVE-2003-0027 First vendor Publication 2003-02-07
Vendor Cve Last vendor Modification 2018-10-30

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0027

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:120
 
Oval ID: oval:org.mitre.oval:def:120
Title: Solaris 7 KCMS Arbitrary File Access Vulnerability
Description: Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure.
Family: unix Class: vulnerability
Reference(s): CVE-2003-0027
Version: 2
Platform(s): Sun Solaris 7
Product(s): kcms_server
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:195
 
Oval ID: oval:org.mitre.oval:def:195
Title: Solaris 8 KCMS Arbitrary File Access Vulnerability
Description: Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure.
Family: unix Class: vulnerability
Reference(s): CVE-2003-0027
Version: 2
Platform(s): Sun Solaris 8
Product(s): kcms_server
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:2592
 
Oval ID: oval:org.mitre.oval:def:2592
Title: KCMS KCS_OPEN_PROFILE File Disclosure Vulnerability
Description: Directory traversal vulnerability in Sun Kodak Color Management System (KCMS) library service daemon (kcms_server) allows remote attackers to read arbitrary files via the KCS_OPEN_PROFILE procedure.
Family: unix Class: vulnerability
Reference(s): CVE-2003-0027
Version: 5
Platform(s): Sun Solaris 7
Sun Solaris 8
Sun Solaris 9
Product(s): kcms_server
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 5
Os 5

OpenVAS Exploits

Date Description
2009-06-03 Name : Solaris Update for kcms_server and kcms_configure 111400-04
File : nvt/gb_solaris_111400_04.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
8201 Sun Kodak Color Management System (KCMS) kcms_server Arbitrary File Access

Sun Kodak Color Management System contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the KCS_OPEN_PROFILE not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the KCMS profile. This directory traversal attack would allow the attacker to access arbitrary files.

Snort® IPS/IDS

Date Description
2014-01-10 kcms_server directory traversal attempt
RuleID : 2007-community - Revision : 16 - Type : PROTOCOL-RPC
2014-01-10 kcms_server directory traversal attempt
RuleID : 2007 - Revision : 16 - Type : PROTOCOL-RPC
2014-01-10 portmap kcms_server request TCP
RuleID : 2006-community - Revision : 18 - Type : PROTOCOL-RPC
2014-01-10 portmap kcms_server request TCP
RuleID : 2006 - Revision : 18 - Type : PROTOCOL-RPC
2014-01-10 portmap kcms_server request UDP
RuleID : 2005-community - Revision : 22 - Type : PROTOCOL-RPC
2014-01-10 portmap kcms_server request UDP
RuleID : 2005 - Revision : 22 - Type : PROTOCOL-RPC

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/6665
BUGTRAQ http://marc.info/?l=bugtraq&m=104326556329850&w=2
CERT-VN http://www.kb.cert.org/vuls/id/850785
MISC http://www.entercept.com/news/uspr/01-22-03.asp
OVAL https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
SUNALERT http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/50104
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/11129

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Date Informations
2024-02-02 01:02:13
  • Multiple Updates
2024-02-01 12:01:25
  • Multiple Updates
2023-09-05 12:02:07
  • Multiple Updates
2023-09-05 01:01:17
  • Multiple Updates
2023-09-02 12:02:08
  • Multiple Updates
2023-09-02 01:01:17
  • Multiple Updates
2023-08-12 12:02:36
  • Multiple Updates
2023-08-12 01:01:17
  • Multiple Updates
2023-08-11 12:02:13
  • Multiple Updates
2023-08-11 01:01:18
  • Multiple Updates
2023-08-06 12:02:02
  • Multiple Updates
2023-08-06 01:01:18
  • Multiple Updates
2023-08-04 12:02:06
  • Multiple Updates
2023-08-04 01:01:18
  • Multiple Updates
2023-07-14 12:02:05
  • Multiple Updates
2023-07-14 01:01:18
  • Multiple Updates
2023-03-29 01:02:03
  • Multiple Updates
2023-03-28 12:01:23
  • Multiple Updates
2022-10-11 12:01:51
  • Multiple Updates
2022-10-11 01:01:11
  • Multiple Updates
2021-05-04 12:01:57
  • Multiple Updates
2021-04-22 01:02:06
  • Multiple Updates
2020-05-23 00:15:20
  • Multiple Updates
2018-10-31 00:19:42
  • Multiple Updates
2017-10-10 09:23:25
  • Multiple Updates
2016-10-18 12:01:08
  • Multiple Updates
2016-06-28 15:01:36
  • Multiple Updates
2016-04-26 12:29:34
  • Multiple Updates
2014-01-19 21:21:53
  • Multiple Updates
2013-05-11 11:50:12
  • Multiple Updates