{ "id": "CVE-2003-1462", "sourceIdentifier": "cve@mitre.org", "published": "2003-12-31T05:00:00.000", "lastModified": "2017-07-29T01:29:12.997", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "mod_survey 3.0.0 through 3.0.15-pre6 does not check whether a survey exists before creating a subdirectory for it, which allows remote attackers to cause a denial of service (disk consumption and possible crash)." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E44F740-732B-483D-B715-1E31696EE7FD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "2DE5CB26-C9B4-4831-B7FA-0401E4A571C3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "73914514-3C19-44E5-8ACA-12F81770CB35" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "910BC04A-CA5B-4FA0-84D4-D08CDB501C35" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "05CBCEDF-6C02-403C-8B52-9A8F70AC2577" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "63EA9172-A1A0-41C4-A243-B691114CE35F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "ECB6187B-EEEC-422F-8287-454B4499F9A1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "1BC94437-39BE-4A8E-A6EB-E969AC9A3D17" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "663BA1DD-470E-42A0-B9DB-8E3949402A7B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "AAFC4DA8-10AA-4DCD-8AA2-EB9ECC3CE0F4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "E8D5E369-BE73-4F67-B2B5-C62282BD3C94" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "84A94398-13AB-4CE6-B73A-005CEA584A11" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "1B11F6DA-7310-454D-846B-5B6AC6B42CAB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A3BCB0D9-E6F3-47B2-B2E4-B419AEDCADE5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "030AE841-F288-465E-A17F-036C48A057CE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.14d:*:*:*:*:*:*:*", "matchCriteriaId": "4F492520-6F6F-406A-8293-FFF34EB79884" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.14e:*:*:*:*:*:*:*", "matchCriteriaId": "664FEE9E-C722-4189-8E7A-D7359C238482" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.15pre1:*:*:*:*:*:*:*", "matchCriteriaId": "12046F92-D383-4CBB-B0FD-B323F84080EC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.15pre2:*:*:*:*:*:*:*", "matchCriteriaId": "92756D1D-D640-42EA-AE5B-ED75EDB102C3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.15pre3:*:*:*:*:*:*:*", "matchCriteriaId": "36ED694F-B51F-490A-91E1-C86C543CF712" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.15pre4:*:*:*:*:*:*:*", "matchCriteriaId": "42925279-D774-439D-8D62-0AE7D2E7F571" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.15pre5:*:*:*:*:*:*:*", "matchCriteriaId": "57B6A3B4-D165-4870-B189-0312BB111626" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mod_survey:mod_survey:3.0.15pre6:*:*:*:*:*:*:*", "matchCriteriaId": "EB8E29E6-19F2-4BE3-9E84-F2263CFEF24B" } ] } ] } ], "references": [ { "url": "http://archives.neohapsis.com/archives/bugtraq/2003-05/0058.html", "source": "cve@mitre.org" }, { "url": "http://gathering.itm.mh.se/modsurvey/SA20030504.txt", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/7498", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11861", "source": "cve@mitre.org" } ] }