Vulnerability Description
Off-by-one error in certain versions of xfstt allows remote attackers to read potentially sensitive memory via a malformed client request in the connection handshake, which leaks the memory in the server's response.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hadrons | Xfstt | < 1.5.1 |
Related Weaknesses (CWE)
References
- http://developer.berlios.de/forum/forum.php?forum_id=2819Broken Link
- http://marc.info/?l=bugtraq&m=105941103709264&w=2ExploitMailing List
- http://www.debian.org/security/2003/dsa-360Broken LinkPatchVendor Advisory
- http://www.securityfocus.com/bid/8255Broken LinkExploitThird Party Advisory
- http://developer.berlios.de/forum/forum.php?forum_id=2819Broken Link
- http://marc.info/?l=bugtraq&m=105941103709264&w=2ExploitMailing List
- http://www.debian.org/security/2003/dsa-360Broken LinkPatchVendor Advisory
- http://www.securityfocus.com/bid/8255Broken LinkExploitThird Party Advisory
FAQ
What is CVE-2003-0625?
CVE-2003-0625 is a vulnerability with a CVSS score of 7.5 (HIGH). Off-by-one error in certain versions of xfstt allows remote attackers to read potentially sensitive memory via a malformed client request in the connection handshake, which leaks the memory in the ser...
How severe is CVE-2003-0625?
CVE-2003-0625 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-0625?
Check the references section above for vendor advisories and patch information. Affected products include: Hadrons Xfstt.