| Vulnerability Name: | CVE-2003-0135 (CCN-11729) | ||||||||
| Assigned: | 2003-04-01 | ||||||||
| Published: | 2003-04-01 | ||||||||
| Updated: | 2017-10-11 | ||||||||
| Summary: | vsftpd FTP daemon in Red Hat Linux 9 is not compiled against TCP wrappers (tcp_wrappers) but is installed as a standalone service, which inadvertently prevents vsftpd from restricting access as intended. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2003-0135 Source: CCN Type: RHSA-2003-084 Updated vsftpd packages re-enable tcp_wrappers support Source: CCN Type: vsftpd Web page vsftpd - secure, fast Source: CCN Type: OSVDB ID: 4564 vsftpd on Red Hat Linux Restricted Access Failure Source: REDHAT Type: Patch, Vendor Advisory RHSA-2003:084 Source: CCN Type: BID-10394 Vsftpd Listener Denial of Service Vulnerability Source: BID Type: Patch, Vendor Advisory 7253 Source: CCN Type: BID-7253 Red Hat Linux 9 vsftpd Compiling Error Weakness Source: XF Type: UNKNOWN vsftpd-tcpwrappers-gain-access(11729) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:634 | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| Oval Definitions | |||||||||
| |||||||||
| BACK | |||||||||