Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:redhat:tcpdump:3.4-39:*:i386:*:*:*:*:*", "matchCriteriaId": "655DF4AC-5573-4832-B601-3121C4206741", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:tcpdump:3.6.2-9:*:i386:*:*:*:*:*", "matchCriteriaId": "BF77546F-26C2-48F7-B041-BA2C9863445C", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:tcpdump:3.6.2-9:*:ia64:*:*:*:*:*", "matchCriteriaId": "2F42C3A9-230E-411C-BF76-4DBC1B074E46", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:tcpdump:3.6.2-12:*:i386:*:*:*:*:*", "matchCriteriaId": "296411E3-2A64-4F21-A9D8-AD31B1EDCB0A", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:tcpdump:3.6.3-3:*:i386:*:*:*:*:*", "matchCriteriaId": "51C18B7E-006A-4D48-BB4D-0F3972032CC8", "vulnerable": true}, {"criteria": "cpe:2.3:a:redhat:tcpdump:3.7.2-1:*:i386:*:*:*:*:*", "matchCriteriaId": "3B52A38A-A3A6-4D33-9B83-15DF47001B41", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D46E093-1C68-43BB-B281-12117EC8DE0F", "vulnerable": true}, {"criteria": "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "E562907F-D915-4030-847A-3C6834A80D4E", "vulnerable": true}, {"criteria": "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "138985E6-5107-4E8B-A801-C3D5FE075227", "vulnerable": true}, {"criteria": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "038FEDE7-986F-4CA5-9003-BA68352B87D4", "vulnerable": true}, {"criteria": "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "matchCriteriaId": "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "tcpdump does not properly drop privileges to the pcap user when starting up."}, {"lang": "es", "value": "Cuando se arranca tcpdump, \u00e9ste no rebaja privilegios adecuadamente al usuario pcap"}], "id": "CVE-2003-0194", "lastModified": "2024-11-20T23:44:11.243", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2003-06-09T04:00:00.000", "references": [{"source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2003-151.html"}, {"source": "cve@mitre.org", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.redhat.com/support/errata/RHSA-2003-174.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2003-151.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch", "Vendor Advisory"], "url": "http://www.redhat.com/support/errata/RHSA-2003-174.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}