First published: Sat Aug 02 2003(Updated: )
Multiple buffer overflows in Novell iChain 2.1 before Field Patch 3, and iChain 2.2 before Field Patch 1a, allow attackers to cause a denial of service (ABEND) and possibly execute arbitrary code via (1) a long user name or (2) an unknown attack related to a "special script against login."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell iChain | =2.1 | |
Novell iChain | =2.1-sp2 | |
Novell iChain | =2.1-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0638 is considered a moderate severity vulnerability due to its potential to cause denial of service and arbitrary code execution.
To fix CVE-2003-0638, upgrade Novell iChain to version 2.1 Field Patch 3 or 2.2 Field Patch 1a or later.
CVE-2003-0638 affects Novell iChain versions 2.1 prior to Field Patch 3 and 2.2 prior to Field Patch 1a.
CVE-2003-0638 allows attackers to exploit buffer overflows through long user names or specific scripts during login.
Yes, CVE-2003-0638 can potentially lead to data breaches by allowing arbitrary code execution.