Vulnerability Description
The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) doublebounce.pl.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sendmail | Sendmail | 8.9.3 |
| Debian | Debian Linux | 3.0 |
References
- http://bugs.debian.org/496408
- http://dev.gentoo.org/~rbu/security/debiantemp/sendmail-base
- http://www.debian.org/security/2003/dsa-305Patch
- http://www.openwall.com/lists/oss-security/2008/10/30/2
- https://bugs.gentoo.org/show_bug.cgi?id=235770
- http://bugs.debian.org/496408
- http://dev.gentoo.org/~rbu/security/debiantemp/sendmail-base
- http://www.debian.org/security/2003/dsa-305Patch
- http://www.openwall.com/lists/oss-security/2008/10/30/2
- https://bugs.gentoo.org/show_bug.cgi?id=235770
FAQ
What is CVE-2003-0308?
CVE-2003-0308 is a vulnerability with a CVSS score of 7.2 (HIGH). The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) double...
How severe is CVE-2003-0308?
CVE-2003-0308 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-0308?
Check the references section above for vendor advisories and patch information. Affected products include: Sendmail Sendmail, Debian Debian Linux.