| Vulnerability Name: | CVE-2003-0256 (CCN-11969) | ||||||||
| Assigned: | 2003-04-28 | ||||||||
| Published: | 2003-04-28 | ||||||||
| Updated: | 2008-09-10 | ||||||||
| Summary: | The GnuPG plugin in kopete before 0.6.2 does not properly cleanse the command line when executing gpg, which allows remote attackers to execute arbitrary commands. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2003-0256 Source: CONECTIVA Type: UNKNOWN CLA-2003:665 Source: CCN Type: Conectiva Linux Security Announcement CLSA-2003:665 kopete Source: CCN Type: Gentoo Linux Security Announcement 200305-03 kopete Unsafe command line cleansing Source: CCN Type: Kopete Web site Kopete, The KDE Instant Messenger Source: CONFIRM Type: UNKNOWN http://kopete.kde.org/index.php?page=newsstory&news=Kopete_releases_version_0.6.2 Source: MANDRAKE Type: UNKNOWN MDKSA-2003:055 Source: CCN Type: OSVDB ID: 2095 kopete GnuPG Plugin CLI gpg Command Remote Command Execution Source: CCN Type: BID-7536 KDE Kopete GPG Plugin Remote Command Execution Vulnerability Source: XF Type: UNKNOWN kopete-gnupg-code-execution(11969) | ||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||