{ "id": "CVE-2003-0188", "sourceIdentifier": "cve@mitre.org", "published": "2003-06-09T04:00:00.000", "lastModified": "2025-04-03T01:03:51.193", "vulnStatus": "Deferred", "cveTags": [], "descriptions": [ { "lang": "en", "value": "lv reads a .lv file from the current working directory, which allows local users to execute arbitrary commands as other lv users by placing malicious .lv files into other directories." }, { "lang": "es", "value": "lv lee un fichero .lv desde el directorio de trabajo actual, lo que permitir\u00eda que usuarios locales ejecuten comandos arbitrarios como otros usuarios lv (colocando ficheros .lv dentro de otros directorios)." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "baseScore": 7.2, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": true, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:lv:lv:4.49.1:*:*:*:*:*:*:*", "matchCriteriaId": "BA6A63E3-13BB-4FD7-B6FF-8494A694A637" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lv:lv:4.49.2:*:*:*:*:*:*:*", "matchCriteriaId": "CFE97CE9-247C-4B85-A2F1-32F14D59190A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lv:lv:4.49.3:*:*:*:*:*:*:*", "matchCriteriaId": "1126844F-3B9D-46E7-9712-7A0D6A67773C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:lv:lv:4.49.4:*:*:*:*:*:*:*", "matchCriteriaId": "07A2DB45-1AA8-42AC-A082-00BD345EE757" }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:lv:4.49.4-1:*:i386:*:*:*:*:*", "matchCriteriaId": "AFB601B0-3BDB-48E2-BAD1-DC139EF0BDB9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:lv:4.49.4-3:*:i386:*:*:*:*:*", "matchCriteriaId": "DEAC3323-384B-4733-886D-56CBE396F72A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:lv:4.49.4-7:*:i386:*:*:*:*:*", "matchCriteriaId": "3E33DD9C-62C8-4616-B627-4903FE90F2FA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:redhat:lv:4.49.4-9:*:i386:*:*:*:*:*", "matchCriteriaId": "0E67C635-26FF-4147-A5C5-E40C6166C9CF" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:linux:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D46E093-1C68-43BB-B281-12117EC8DE0F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:linux:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "E562907F-D915-4030-847A-3C6834A80D4E" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:linux:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "138985E6-5107-4E8B-A801-C3D5FE075227" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "038FEDE7-986F-4CA5-9003-BA68352B87D4" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:linux:9.0:*:i386:*:*:*:*:*", "matchCriteriaId": "F3FDE8C4-5FFD-4CC2-9F35-7C32043966D1" } ] } ] } ], "references": [ { "url": "http://www.debian.org/security/2003/dsa-304", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-167.html", "source": "cve@mitre.org" }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-169.html", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.turbolinux.com/security/TLSA-2003-35.txt", "source": "cve@mitre.org" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A430", "source": "cve@mitre.org" }, { "url": "http://www.debian.org/security/2003/dsa-304", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-167.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.redhat.com/support/errata/RHSA-2003-169.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.turbolinux.com/security/TLSA-2003-35.txt", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A430", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }