Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2003-0028 | First vendor Publication | 2003-03-25 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0028 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:230 | |||
Oval ID: | oval:org.mitre.oval:def:230 | ||
Title: | xdrmem_bytes() Integer Overflow Vulnerability | ||
Description: | Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0028 | Version: | 2 |
Platform(s): | Red Hat Linux 9 | Product(s): | krb5 |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 266-1 (krb5) File : nvt/deb_266_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 272-1 (dietlibc) File : nvt/deb_272_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 282-1 (glibc) File : nvt/deb_282_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
4501 | RPC XDR xdrmem_getbytes() Function Remote Overflow |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | portmap proxy integer overflow attempt TCP RuleID : 2093-community - Revision : 13 - Type : PROTOCOL-RPC |
2014-01-10 | portmap proxy integer overflow attempt TCP RuleID : 2093 - Revision : 13 - Type : PROTOCOL-RPC |
2014-01-10 | portmap proxy integer overflow attempt UDP RuleID : 2092-community - Revision : 14 - Type : PROTOCOL-RPC |
2014-01-10 | portmap proxy integer overflow attempt UDP RuleID : 2092 - Revision : 14 - Type : PROTOCOL-RPC |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-266.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-272.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-282.nasl - Type : ACT_GATHER_INFO |
2004-09-01 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2004-448.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-037.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-043.nasl - Type : ACT_GATHER_INFO |
2004-07-25 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2003_027.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-052.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-090.nasl - Type : ACT_GATHER_INFO |
2003-03-19 | Name : Arbitrary code may be run on the remote server. File : rpc_xdrmem_bytes.nasl - Type : ACT_DESTRUCTIVE_ATTACK |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:34 |
|
2024-11-28 12:05:29 |
|
2024-08-02 12:02:26 |
|
2024-08-02 01:01:24 |
|
2024-02-02 01:02:13 |
|
2024-02-01 12:01:25 |
|
2023-09-05 12:02:07 |
|
2023-09-05 01:01:17 |
|
2023-09-02 12:02:08 |
|
2023-09-02 01:01:17 |
|
2023-08-12 12:02:36 |
|
2023-08-12 01:01:17 |
|
2023-08-11 12:02:13 |
|
2023-08-11 01:01:18 |
|
2023-08-06 12:02:03 |
|
2023-08-06 01:01:18 |
|
2023-08-04 12:02:06 |
|
2023-08-04 01:01:18 |
|
2023-07-14 12:02:05 |
|
2023-07-14 01:01:18 |
|
2023-03-29 01:02:03 |
|
2023-03-28 12:01:23 |
|
2022-10-11 12:01:51 |
|
2022-10-11 01:01:11 |
|
2021-05-04 12:01:57 |
|
2021-04-22 01:02:06 |
|
2020-05-23 00:15:20 |
|
2019-03-19 12:01:35 |
|
2018-10-31 00:19:42 |
|
2018-10-19 21:19:34 |
|
2018-05-03 09:19:25 |
|
2016-10-18 12:01:08 |
|
2016-06-28 15:01:37 |
|
2016-04-26 12:29:35 |
|
2014-02-17 10:25:43 |
|
2014-01-19 21:21:53 |
|
2013-05-11 11:50:15 |
|