Vulnerability Description
Buffer overflow in escputil, as included in the printer-drivers package in Mandrake Linux, allows local users to execute arbitrary code via a long printer-name command line argument.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Robert Krawitz | Escputil | 1.15.2.2 |
References
- http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0029.html
- http://www.idefense.com/advisory/01.21.03.txtExploitPatchVendor Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2003:010
- http://www.securityfocus.com/archive/1/307608/30/26270/threaded
- http://www.securityfocus.com/bid/6658
- http://www.securitytracker.com/id?1005959
- http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0029.html
- http://www.idefense.com/advisory/01.21.03.txtExploitPatchVendor Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2003:010
- http://www.securityfocus.com/archive/1/307608/30/26270/threaded
- http://www.securityfocus.com/bid/6658
- http://www.securitytracker.com/id?1005959
FAQ
What is CVE-2003-0035?
CVE-2003-0035 is a vulnerability with a CVSS score of 7.2 (HIGH). Buffer overflow in escputil, as included in the printer-drivers package in Mandrake Linux, allows local users to execute arbitrary code via a long printer-name command line argument.
How severe is CVE-2003-0035?
CVE-2003-0035 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-0035?
Check the references section above for vendor advisories and patch information. Affected products include: Robert Krawitz Escputil.