Description
Format string vulnerability in tcpflow, when used in a setuid context, allows local users to execute arbitrary code via the device name argument, as demonstrated in Sustworks IPNetSentryX and IPNetMonitorX the setuid program RunTCPFlow.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2003-0665 | Format string vulnerability in tcpflow, when used in a setuid context, allows local users to execute arbitrary code via the device name argument, as demonstrated in Sustworks IPNetSentryX and IPNetMonitorX the setuid program RunTCPFlow. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-17T03:49:26.354Z
Reserved: 2003-08-07T00:00:00.000Z
Link: CVE-2003-0671
No data.
Status : Modified
Published: 2003-08-27T04:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2003-0671
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD