Vulnerability Description
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Glibc | 2.1 |
| Mit | Kerberos 5 | 1.2 |
| Openafs | Openafs | 1.0 |
| Sgi | Irix | 6.5 |
| Cray | Unicos | 6.0 |
| Freebsd | Freebsd | 4.0 |
| Hp | Hp-Ux | 10.20 |
| Hp | Hp-Ux Series 700 | 10.20 |
| Hp | Hp-Ux Series 800 | 10.20 |
| Ibm | Aix | 4.3.3 |
| Openbsd | Openbsd | 2.0 |
| Sun | Solaris | 2.5.1 |
| Sun | Sunos | - |
References
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-008.txt.asc
- http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0140.html
- http://marc.info/?l=bugtraq&m=104810574423662&w=2
- http://marc.info/?l=bugtraq&m=104811415301340&w=2
- http://marc.info/?l=bugtraq&m=104860855114117&w=2
- http://marc.info/?l=bugtraq&m=104878237121402&w=2
- http://marc.info/?l=bugtraq&m=105362148313082&w=2
- http://www.cert.org/advisories/CA-2003-10.htmlPatchThird Party AdvisoryUS Government Resource
- http://www.debian.org/security/2003/dsa-266
- http://www.debian.org/security/2003/dsa-272
- http://www.debian.org/security/2003/dsa-282
- http://www.eeye.com/html/Research/Advisories/AD20030318.htmlExploitVendor Advisory
- http://www.kb.cert.org/vuls/id/516825US Government Resource
- http://www.linuxsecurity.com/advisories/engarde_advisory-3024.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2003:037
FAQ
What is CVE-2003-0028?
CVE-2003-0028 is a vulnerability with a CVSS score of 7.5 (HIGH). Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allo...
How severe is CVE-2003-0028?
CVE-2003-0028 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-0028?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc, Mit Kerberos 5, Openafs Openafs, Sgi Irix, Cray Unicos.