4.6
CVSSv2

CVE-2003-0102

Published: 18/03/2003 Updated: 03/05/2018
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 470
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in tryelf() in readelf.c of the file command allows malicious users to execute arbitrary code as the user running file, possibly via a large entity size value in an ELF header (elfhdr.e_shentsize).

Vulnerable Product Search on Vulmon Subscribe to Product

file file 3.30

file file 3.32

file file 3.28

file file 3.37

file file 3.39

file file 3.40

file file 3.33

file file 3.34

file file 3.35

file file 3.36

netbsd netbsd 1.5

netbsd netbsd 1.5.1

netbsd netbsd 1.5.2

netbsd netbsd 1.5.3

netbsd netbsd 1.6

Vendor Advisories

iDEFENSE discovered a buffer overflow vulnerability in the ELF format parsing of the "file" command, one which can be used to execute arbitrary code with the privileges of the user running the command The vulnerability can be exploited by crafting a special ELF binary which is then input to file This could be accomplished by leaving the binary on ...

Exploits

source: wwwsecurityfocuscom/bid/7008/info It has been reported that a stack overflow exists in the file program Although details of this issue are currently unavailable, it is likely that this issue could be exploited to execute code as the user invoking file /* ** file(1) exploit for *bsd,linux ** does cp /bin/sh /tmp/sh;chmod 4755 ...
source: wwwsecurityfocuscom/bid/7008/info It has been reported that a stack overflow exists in the file program Although details of this issue are currently unavailable, it is likely that this issue could be exploited to execute code as the user invoking file /* ** elfrape BY lem0n (lem0nxx@hotmailcom) ** a glorified stack overflow i ...