{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2003-0955", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "OpenBSD kernel 3.3 and 3.4 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code in 3.4 via a program with an invalid header that is not properly handled by (1) ibcs2_exec.c in the iBCS2 emulation (compat_ibcs2) or (2) exec_elf.c, which leads to a stack-based buffer overflow." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20031104 OpenBSD kernel overflow, yet still *BSD much better than windows", "refsource" : "FULLDISC", "url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2003-November/013315.html" }, { "name" : "20031105 005: RELIABILITY FIX: November 4, 2003", "refsource" : "OPENBSD", "url" : "ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/005_exec.patch" }, { "name" : "20031104 010: RELIABILITY FIX: November 4, 2003", "refsource" : "OPENBSD", "url" : "http://www.openbsd.org/errata33.html" }, { "name" : "http://marc.info/?l=openbsd-security-announce&m=106917441524978&w=2", "refsource" : "CONFIRM", "url" : "http://marc.info/?l=openbsd-security-announce&m=106917441524978&w=2" }, { "name" : "http://marc.info/?l=openbsd-security-announce&m=106808820119679&w=2", "refsource" : "CONFIRM", "url" : "http://marc.info/?l=openbsd-security-announce&m=106808820119679&w=2" }, { "name" : "http://www.guninski.com/msuxobsd2.html", "refsource" : "MISC", "url" : "http://www.guninski.com/msuxobsd2.html" }, { "name" : "8978", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/8978" } ] } }