CVE-2003-0086 Details

CVE-2003-0086

Published: 2003-03-31
Last Modified: 2018-10-19
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

The code for writing reg files in Samba before 2.2.8 allows local users to overwrite arbitrary files via a race condition involving chown.

Analysis
Common Vulnerability Score System v2.0
Severity Low
Base Score 1.2/10
Exploit Score 1.9/10
Access Vector Local
Access Complexity High
Authentication None
Impact Score 2.9/10
Confidentiality Impact None
Availability Impact None
Integrity Impact Partial
Vector String AV:L/AC:H/Au:N/C:N/I:P/A:N
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:* Yes - -
cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:* Yes - -
References

ftp://patches.sgi.com/support/free/security/advisories/20030302-01-I
http://marc.info/?l=bugtraq&m=104792646416629&w=2
http://marc.info/?l=bugtraq&m=104801012929374&w=2
http://secunia.com/advisories/8299
http://secunia.com/advisories/8303
http://www.debian.org/security/2003/dsa-262
http://www.gentoo.org/security/en/glsa/glsa-200303-11.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2003:032
http://www.novell.com/linux/security/advisories/2003_016_samba.html
http://www.redhat.com/support/errata/RHSA-2003-095.html
http://www.redhat.com/support/errata/RHSA-2003-096.html
http://www.securityfocus.com/archive/1/316165/30/25370/threaded
http://www.securityfocus.com/bid/7107
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A554

CVE ID
CVE-2003-0086
Published
2003-03-31
Modified
2018-10-19
CVSSv2.0
Low
PCI Compliance
Pass
US-CERT Alert
No
CWE
CWE Pending

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.