CVE-2003-1358
Published Dec 31, 2003
Last updated 7 years ago
Overview
- Description
- rs.F300 for HP-UX 10.0 through 11.22 uses the PATH environment variable to find and execute programs such as rm while operating at raised privileges, which allows local users to gain privileges by modifying the path to point to a malicious rm program.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3187435B-C052-4DBA-AA79-F8AC0287EE14" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53BBFE9A-6846-4625-91AC-47AA0BC0933A" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2170549C-80D2-4FF8-AC07-BD4124125B02" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "066D4E93-366F-42D4-B27D-8AF981F5F2AD" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38E41C26-A086-4C9C-83D8-CB910F4B67F1" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4259A901-A1CF-44EE-80C4-2031D3FCADC3" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.26:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE98EAD2-838F-42A2-BC90-F739A6639D47" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFD50216-90AC-480E-A11C-E88E64C6D84A" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DB008E3-9A00-4D28-8826-A9FCC9F65314" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B7A7B90-9086-4A10-8FB4-1C1D909BC173" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AB76FE0-BEF3-40D4-B362-0C95CA625A71" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD" } ], "operator": "OR" } ] } ]