CVE-2003-0525
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/08/2003
Last modified:
03/04/2025
Description
The getCanonicalPath function in Windows NT 4.0 may free memory that it does not own and cause heap corruption, which allows attackers to cause a denial of service (crash) via requests that cause a long file name to be passed to getCanonicalPath, as demonstrated on the IBM JVM using a long string to the java.io.getCanonicalPath Java method.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:* | ||
cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.atstake.com/research/advisories/2003/a072303-1.txt
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-029
- https://exchange.xforce.ibmcloud.com/vulnerabilities/12701
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A319
- http://www.atstake.com/research/advisories/2003/a072303-1.txt
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-029
- https://exchange.xforce.ibmcloud.com/vulnerabilities/12701
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A319