First published: Thu Oct 09 2003(Updated: )
Buffer overflow in net.c for cfengine 2.x before 2.0.8 allows remote attackers to execute arbitrary code via certain packets with modified length values, which is trusted by the ReceiveTransaction function when using a buffer provided by the BusyWithConnection function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CFEngine | =2.0.0 | |
CFEngine | =2.0.1 | |
CFEngine | =2.0.2 | |
CFEngine | =2.0.3 | |
CFEngine | =2.0.4 | |
CFEngine | =2.0.5 | |
CFEngine | =2.0.5-b1 | |
CFEngine | =2.0.5-pre | |
CFEngine | =2.0.5-pre2 | |
CFEngine | =2.0.6 | |
CFEngine | =2.0.7 | |
CFEngine | =2.0.7-p1 | |
CFEngine | =2.0.7-p2 | |
CFEngine | =2.0.7-p3 | |
CFEngine | =2.1.0-a6 | |
CFEngine | =2.1.0-a8 | |
CFEngine | =2.1.0-a9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0849 is considered to have a critical severity level due to the potential for remote code execution.
To fix CVE-2003-0849, upgrade cfengine to version 2.0.8 or later, which addresses the buffer overflow vulnerability.
CVE-2003-0849 affects GNU CFEngine versions 2.0.0 through 2.0.7 and certain earlier versions.
CVE-2003-0849 is a buffer overflow vulnerability that can allow remote attackers to execute arbitrary code.
Yes, CVE-2003-0849 can be exploited remotely via specially crafted packets.