First published: Tue Jun 10 2003(Updated: )
Multiple buffer overflows in Options Parsing Tool (OPT) shared library 3.18 and earlier, when used in setuid programs, may allow local users to execute arbitrary code via long command line options that are fed into macros such as opt_warn_2, as used in functions such as opt_atoi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache James | <=3.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0390 is classified as a high severity vulnerability due to the potential for local users to execute arbitrary code.
To fix CVE-2003-0390, upgrade the Options Parsing Tool (OPT) shared library to version 3.19 or later.
CVE-2003-0390 affects Options Parsing Tool (OPT) versions 3.18 and earlier.
CVE-2003-0390 allows local users to exploit buffer overflows to execute arbitrary code via crafted command line options.
Local users of setuid programs that utilize the vulnerable Options Parsing Tool library are at risk from CVE-2003-0390.