CVE-2003-0188
Published Jun 9, 2003
Last updated 7 years ago
Overview
- Description
- lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:lv:lv:4.49.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA6A63E3-13BB-4FD7-B6FF-8494A694A637" }, { "criteria": "cpe:2.3:a:lv:lv:4.49.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFE97CE9-247C-4B85-A2F1-32F14D59190A" }, { "criteria": "cpe:2.3:a:lv:lv:4.49.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1126844F-3B9D-46E7-9712-7A0D6A67773C" }, { "criteria": "cpe:2.3:a:lv:lv:4.49.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07A2DB45-1AA8-42AC-A082-00BD345EE757" }, { "criteria": "cpe:2.3:a:redhat:lv:4.49.4-1:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFB601B0-3BDB-48E2-BAD1-DC139EF0BDB9" }, { "criteria": "cpe:2.3:a:redhat:lv:4.49.4-3:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEAC3323-384B-4733-886D-56CBE396F72A" }, { "criteria": "cpe:2.3:a:redhat:lv:4.49.4-7:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E33DD9C-62C8-4616-B627-4903FE90F2FA" }, { "criteria": "cpe:2.3:a:redhat:lv:4.49.4-9:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E67C635-26FF-4147-A5C5-E40C6166C9CF" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D46E093-1C68-43BB-B281-12117EC8DE0F" }, { "criteria": "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E562907F-D915-4030-847A-3C6834A80D4E" }, { "criteria": "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "138985E6-5107-4E8B-A801-C3D5FE075227" }, { "criteria": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "038FEDE7-986F-4CA5-9003-BA68352B87D4" }, { "criteria": "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1" } ], "operator": "OR" } ] } ]