CVE-2003-0144
Published Mar 31, 2003
Last updated 7 years ago
Overview
- Description
- Buffer overflow in the lprm command in the lprold lpr package on SuSE 7.1 through 7.3, OpenBSD 3.2 and earlier, and possibly other operating systems, allows local users to gain root privileges via long command line arguments such as (1) request ID or (2) user name.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:lprold:lprold:3.0.48:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FADD49BC-8501-4C7F-98F2-04969400A23D" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:bsd:lpr:0.48:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81F6F1BE-8D00-413B-A20B-B0B2A5913549" }, { "criteria": "cpe:2.3:o:bsd:lpr:2000-05-07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56BE0182-8438-48DD-B651-B598939CF5E1" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "183667CA-6DF1-4BFB-AE32-9ABF55B7283A" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBDDEC3F-52EB-4E1E-84C4-B472600059EC" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B58E02AE-38B4-466E-BF73-2F0B80AF7BA5" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3928D5CF-6FC0-434C-8A80-ABDBF346C2C9" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "314BA420-4C74-4060-8ACE-D7A7C041CF2B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EAD7613-A5B3-4621-B981-290C7C6B8BA0" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36DF0D51-FCFA-46A3-B834-E80DFA91DFDC" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CB726CF-ADA2-4CDA-9786-1E84AC53740A" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FC373FC-88AC-4B6D-A289-51881ACD57F7" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D2DA7F0-E3C0-447A-A2B0-ECC928389D84" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEBE290B-5EC6-4BBA-B645-294C150E417A" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACE7FDFB-C6A6-4B58-B0B4-236E4EA76EF6" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DF053A1-C252-427E-9EEF-27240F422976" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48A9C344-45AA-47B9-B35A-1A62E220D9C6" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80EB24F0-46A7-481B-83ED-8BB012AE0C8E" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA6AEAF0-FA61-4A3F-A083-1218C2027781" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60DA30A1-3360-46BC-85B7-008D535F95BE" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA33E7E2-DE7B-411E-8991-718DA0988C51" }, { "criteria": "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1957B3C0-7F25-469B-BC3F-7B09260837ED" } ], "operator": "OR" } ] } ]