CVE-2003-0434
Published Jul 24, 2003
Last updated 7 years ago
Overview
- Description
- Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:5.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B453FA1D-0FE9-4324-9644-E167561926C2" }, { "criteria": "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33F6F859-B7B8-4072-B073-6CC8291D642E" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4AD30B9-8FBA-48B3-B2B2-014C950B9BAA" }, { "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0F0D201-B1DC-4024-AF77-A284673618F3" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2641EE56-6F9D-400B-B456-877F4DA79B10" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0B458EA-495E-40FA-9379-C03757F7B1EE" }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1728AB5D-55A9-46B0-A412-6F7263CAEB5A" }, { "criteria": "cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D46E093-1C68-43BB-B281-12117EC8DE0F" }, { "criteria": "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E562907F-D915-4030-847A-3C6834A80D4E" }, { "criteria": "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "138985E6-5107-4E8B-A801-C3D5FE075227" }, { "criteria": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "038FEDE7-986F-4CA5-9003-BA68352B87D4" }, { "criteria": "cpe:2.3:o:redhat:linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E66F7BF0-EF7C-4695-9D67-7C1A01C6F9B9" }, { "criteria": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8DBD9D3C-40AB-449D-A9A8-A09DF2DEDB96" } ], "operator": "OR" } ] } ]