CVE-2003-0775
Published Sep 22, 2003
Last updated 16 years ago
Overview
- Description
- saned in sane-backends 1.0.7 and earlier calls malloc with an arbitrary size value if a connection is dropped before the size value has been sent, which allows remote attackers to cause a denial of service (memory consumption or crash).
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sane:sane:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49B2EFC6-08BE-45A6-81A9-1592C18FC41E" }, { "criteria": "cpe:2.3:a:sane:sane:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C653F5D7-8F19-4EA6-A3E1-CBE493D45E86" }, { "criteria": "cpe:2.3:a:sane:sane:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "67D729AD-29EB-4352-811C-CF4BE2A78699" }, { "criteria": "cpe:2.3:a:sane:sane:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5081C505-7F02-450F-AFC0-75BBF21C0BED" }, { "criteria": "cpe:2.3:a:sane:sane:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75940BFB-561E-4F68-9301-BB4ACC667E08" }, { "criteria": "cpe:2.3:a:sane:sane:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6688485-2120-4660-B9C2-3DFA1BE970AD" }, { "criteria": "cpe:2.3:a:sane:sane:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A638B1D-4542-4195-990C-43F451B4A6BA" }, { "criteria": "cpe:2.3:a:sane:sane:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F806EB9D-A188-4580-B01E-3EFC5791A771" }, { "criteria": "cpe:2.3:a:sane:sane:1.0.7_beta1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8AB22C87-F2E6-493F-AE53-B9549A786372" }, { "criteria": "cpe:2.3:a:sane:sane:1.0.7_beta2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB0E5793-44DB-48F4-B07C-740E45F87A0D" }, { "criteria": "cpe:2.3:a:sane:sane:1.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFE0F785-1D8C-4B58-B437-EA5E71645A04" }, { "criteria": "cpe:2.3:a:sane:sane:1.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D360EAE-7D1D-463F-B9F2-CC1C8D0A2819" }, { "criteria": "cpe:2.3:a:sane:sane-backend:1.0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E7DF79C-DB91-4625-8F47-E18E828D5F81" } ], "operator": "OR" } ] } ]