CVE-2003-0625

Off-by-one error in certain versions of xfstt allows remote attackers to read potentially sensitive memory via a malformed client request in the connection handshake, which leaks the memory in the server's response.
References
Link Resource
http://developer.berlios.de/forum/forum.php?forum_id=2819 Broken Link
http://marc.info/?l=bugtraq&m=105941103709264&w=2 Exploit Mailing List
http://www.debian.org/security/2003/dsa-360 Broken Link Patch Vendor Advisory
http://www.securityfocus.com/bid/8255 Broken Link Exploit Third Party Advisory VDB Entry Vendor Advisory
http://developer.berlios.de/forum/forum.php?forum_id=2819 Broken Link
http://marc.info/?l=bugtraq&m=105941103709264&w=2 Exploit Mailing List
http://www.debian.org/security/2003/dsa-360 Broken Link Patch Vendor Advisory
http://www.securityfocus.com/bid/8255 Broken Link Exploit Third Party Advisory VDB Entry Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:hadrons:xfstt:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:45

Type Values Removed Values Added
References () http://developer.berlios.de/forum/forum.php?forum_id=2819 - Broken Link () http://developer.berlios.de/forum/forum.php?forum_id=2819 - Broken Link
References () http://marc.info/?l=bugtraq&m=105941103709264&w=2 - Exploit, Mailing List () http://marc.info/?l=bugtraq&m=105941103709264&w=2 - Exploit, Mailing List
References () http://www.debian.org/security/2003/dsa-360 - Broken Link, Patch, Vendor Advisory () http://www.debian.org/security/2003/dsa-360 - Broken Link, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/8255 - Broken Link, Exploit, Third Party Advisory, VDB Entry, Vendor Advisory () http://www.securityfocus.com/bid/8255 - Broken Link, Exploit, Third Party Advisory, VDB Entry, Vendor Advisory

15 Feb 2024, 21:12

Type Values Removed Values Added
References (CONFIRM) http://developer.berlios.de/forum/forum.php?forum_id=2819 - (CONFIRM) http://developer.berlios.de/forum/forum.php?forum_id=2819 - Broken Link
References (BID) http://www.securityfocus.com/bid/8255 - Exploit, Vendor Advisory (BID) http://www.securityfocus.com/bid/8255 - Broken Link, Exploit, Third Party Advisory, VDB Entry, Vendor Advisory
References (DEBIAN) http://www.debian.org/security/2003/dsa-360 - Patch, Vendor Advisory (DEBIAN) http://www.debian.org/security/2003/dsa-360 - Broken Link, Patch, Vendor Advisory
References (BUGTRAQ) http://marc.info/?l=bugtraq&m=105941103709264&w=2 - (BUGTRAQ) http://marc.info/?l=bugtraq&m=105941103709264&w=2 - Exploit, Mailing List
CWE NVD-CWE-Other CWE-193
First Time Hadrons xfstt
Hadrons
CVSS v2 : 6.4
v3 : unknown
v2 : 6.4
v3 : 7.5
CPE cpe:2.3:a:xfstt:xfstt:1.4:*:*:*:*:*:*:*
cpe:2.3:a:xfstt:xfstt:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:hadrons:xfstt:*:*:*:*:*:*:*:*

Information

Published : 2003-08-27 04:00

Updated : 2024-11-20 23:45


NVD link : CVE-2003-0625

Mitre link : CVE-2003-0625

CVE.ORG link : CVE-2003-0625


JSON object : View

Products Affected

hadrons

  • xfstt
CWE
CWE-193

Off-by-one Error