Vulnerability Description
Stack-based buffer overflow in vfs_s_resolve_symlink of vfs/direntry.c for Midnight Commander (mc) 4.6.0 and earlier, and possibly later versions, allows remote attackers to execute arbitrary code during symlink conversion.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Midnight Commander | Midnight Commander | 4.5.52 |
References
- ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2004-014.0.txt
- ftp://patches.sgi.com/support/free/security/advisories/20040201-01-U.asc
- ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc
- http://archive.cert.uni-stuttgart.de/bugtraq/2003/09/msg00309.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000833
- http://fedoranews.org/updates/FEDORA-2004-058.shtml
- http://marc.info/?l=bugtraq&m=108118433222764&w=2
- http://rhn.redhat.com/errata/RHSA-2004-034.html
- http://rhn.redhat.com/errata/RHSA-2004-035.html
- http://secunia.com/advisories/10645
- http://secunia.com/advisories/10685
- http://secunia.com/advisories/10716
- http://secunia.com/advisories/10772
- http://secunia.com/advisories/10823
- http://secunia.com/advisories/11219
FAQ
What is CVE-2003-1023?
CVE-2003-1023 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in vfs_s_resolve_symlink of vfs/direntry.c for Midnight Commander (mc) 4.6.0 and earlier, and possibly later versions, allows remote attackers to execute arbitrary code dur...
How severe is CVE-2003-1023?
CVE-2003-1023 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1023?
Check the references section above for vendor advisories and patch information. Affected products include: Midnight Commander Midnight Commander.