CVE-2003-1287
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
31/12/2003
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Sambar Server before 6.0 beta 3 allows attackers with physical access to execute arbitrary code via a request with an MS-DOS device name such as com1.pl, con.pl, or aux.pl, which causes Perl to read the code from the associated device.
Impacto
Puntuación base 2.0
4.60
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:sambar:sambar_server:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.0:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.0:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.0:beta3:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.0:beta4:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.0:beta5:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.0:beta6:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.1:beta1:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.1:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.1:beta3:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.1:beta4:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.1:beta5:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:sambar:sambar_server:5.3:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html
- http://secunia.com/advisories/9578
- http://securitytracker.com/id?1007819=
- http://www.idefense.com/application/poi/display?id=103&type=vulnerabilities&flashstatus=true
- http://www.osvdb.org/5781
- http://www.sambar.com/security.htm
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16059
- http://archives.neohapsis.com/archives/bugtraq/2004-04/0353.html
- http://secunia.com/advisories/9578
- http://securitytracker.com/id?1007819=
- http://www.idefense.com/application/poi/display?id=103&type=vulnerabilities&flashstatus=true
- http://www.osvdb.org/5781
- http://www.sambar.com/security.htm
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16059