ID CVE-2003-0848
Summary Heap-based buffer overflow in main.c of slocate 2.6, and possibly other versions, may allow local users to gain privileges via a modified slocate database that causes a negative "pathlen" value to be used.
References
Vulnerable Configurations
  • cpe:2.3:a:slocate:slocate:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:slocate:slocate:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:slocate:slocate:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:slocate:slocate:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:slocate:slocate:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:slocate:slocate:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:slocate:slocate:2.4:*:*:*:*:*:*:*
    cpe:2.3:a:slocate:slocate:2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:slocate:slocate:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:slocate:slocate:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:slocate:slocate:2.6:*:*:*:*:*:*:*
    cpe:2.3:a:slocate:slocate:2.6:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 11-10-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:P/A:P
oval via4
  • accepted 2013-04-29T04:10:55.131-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    description Heap-based buffer overflow in main.c of slocate 2.6, and possibly other versions, may allow local users to gain privileges via a modified slocate database that causes a negative "pathlen" value to be used.
    family unix
    id oval:org.mitre.oval:def:11033
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Heap-based buffer overflow in main.c of slocate 2.6, and possibly other versions, may allow local users to gain privileges via a modified slocate database that causes a negative "pathlen" value to be used.
    version 29
  • accepted 2007-04-25T19:52:56.173-04:00
    class vulnerability
    contributors
    • name Jay Beale
      organization Bastille Linux
    • name Matt Busby
      organization The MITRE Corporation
    • name Thomas R. Jones
      organization Maitreya Security
    description Heap-based buffer overflow in main.c of slocate 2.6, and possibly other versions, may allow local users to gain privileges via a modified slocate database that causes a negative "pathlen" value to be used.
    family unix
    id oval:org.mitre.oval:def:821
    status accepted
    submitted 2004-03-20T12:00:00.000-04:00
    title slocate Privilege Escalation Vulnerability
    version 37
redhat via4
advisories
  • rhsa
    id RHSA-2004:040
  • rhsa
    id RHSA-2004:041
rpms
  • slocate-0:2.7-3
  • slocate-debuginfo-0:2.7-3
refmap via4
bugtraq
  • 20031006 SA-20031006 slocate vulnerability
  • 20031011 SA-20031006 slocate buffer overflow - exploitation proof
debian DSA-428
fedora FEDORA-2004-059
mandrake MDKSA-2004:004
misc
sco CSSA-2004-001.0
secunia
  • 10670
  • 10683
  • 10686
  • 10698
  • 10702
  • 10720
  • 10722
  • 9962
sgi
  • 20040201-01-U
  • 20040202-01-U
trustix 2004-0005
Last major update 11-10-2017 - 01:29
Published 17-11-2003 - 05:00
Last modified 11-10-2017 - 01:29
Back to Top