Vulnerability Name: | CVE-2003-0256 (CCN-11969) | ||||||||
Assigned: | 2003-04-28 | ||||||||
Published: | 2003-04-28 | ||||||||
Updated: | 2008-09-10 | ||||||||
Summary: | The GnuPG plugin in kopete before 0.6.2 does not properly cleanse the command line when executing gpg, which allows remote attackers to execute arbitrary commands. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2003-0256 Source: CONECTIVA Type: UNKNOWN CLA-2003:665 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2003:665 kopete Source: CCN Type: Gentoo Linux Security Announcement 200305-03 kopete Unsafe command line cleansing Source: CCN Type: Kopete Web site Kopete, The KDE Instant Messenger Source: CONFIRM Type: UNKNOWN http://kopete.kde.org/index.php?page=newsstory&news=Kopete_releases_version_0.6.2 Source: MANDRAKE Type: UNKNOWN MDKSA-2003:055 Source: CCN Type: OSVDB ID: 2095 kopete GnuPG Plugin CLI gpg Command Remote Command Execution Source: CCN Type: BID-7536 KDE Kopete GPG Plugin Remote Command Execution Vulnerability Source: XF Type: UNKNOWN kopete-gnupg-code-execution(11969) | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
BACK |