Vulnerability Description
Buffer overflow in the syslog daemon for Solaris 2.6 through 9 allows remote attackers to cause a denial of service (syslogd crash) and possibly execute arbitrary code via long syslog UDP packets.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sun | Solaris | 2.6 |
| Sun | Sunos | - |
References
- http://secunia.com/advisories/8944/Patch
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-55440-1Vendor Advisory
- http://www.securityfocus.com/archive/1/324015
- http://www.securityfocus.com/bid/7820Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/12194
- http://secunia.com/advisories/8944/Patch
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-55440-1Vendor Advisory
- http://www.securityfocus.com/archive/1/324015
- http://www.securityfocus.com/bid/7820Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/12194
FAQ
What is CVE-2003-1066?
CVE-2003-1066 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Buffer overflow in the syslog daemon for Solaris 2.6 through 9 allows remote attackers to cause a denial of service (syslogd crash) and possibly execute arbitrary code via long syslog UDP packets.
How severe is CVE-2003-1066?
CVE-2003-1066 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1066?
Check the references section above for vendor advisories and patch information. Affected products include: Sun Solaris, Sun Sunos.