| Vulnerability Name: | CVE-2003-0262 (CCN-11945) | ||||||||
| Assigned: | 2003-05-06 | ||||||||
| Published: | 2003-05-06 | ||||||||
| Updated: | 2017-07-11 | ||||||||
| Summary: | leksbot 1.2.3 in Debian GNU/Linux installs the KATAXWR as setuid root, which allows local users to gain root privileges by exploiting unknown vulnerabilities related to the escalated privileges, which KATAXWR is not designed to have. | ||||||||
| CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
| CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Privileges | ||||||||
| References: | Source: CCN Type: DSA 299-1 New leksbot packages fix improper setuid-root execution Source: MITRE Type: CNA CVE-2003-0262 Source: DEBIAN Type: Patch, Vendor Advisory DSA-299 Source: DEBIAN Type: DSA-299 leksbot -- improper setuid-root execution Source: CCN Type: OSVDB ID: 12065 leksbot KATAXWR Unspecified Local Privilege Escalation Source: BID Type: UNKNOWN 7505 Source: CCN Type: BID-7505 Leksbot Multiple Unspecified Vulnerabilities Source: XF Type: UNKNOWN kataxwr-gain-privileges(11945) Source: XF Type: UNKNOWN kataxwr-gain-privileges(11945) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| Oval Definitions | |||||||||
| |||||||||
| BACK | |||||||||