First published: Sat Oct 25 2003(Updated: )
ls in the fileutils or coreutils packages allows local users to consume a large amount of memory via a large -w value, which can be remotely exploited via applications that use ls, such as wu-ftpd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Fileutils | =4.0 | |
GNU Fileutils | =4.0.36 | |
GNU Fileutils | =4.1 | |
GNU Fileutils | =4.1.6 | |
GNU Fileutils | =4.1.7 | |
wu-ftpd | =2.4.1 | |
wu-ftpd | =2.4.2_beta2 | |
wu-ftpd | =2.4.2_beta18 | |
wu-ftpd | =2.4.2_beta18_vr4 | |
wu-ftpd | =2.4.2_beta18_vr5 | |
wu-ftpd | =2.4.2_beta18_vr6 | |
wu-ftpd | =2.4.2_beta18_vr7 | |
wu-ftpd | =2.4.2_beta18_vr8 | |
wu-ftpd | =2.4.2_beta18_vr9 | |
wu-ftpd | =2.4.2_beta18_vr10 | |
wu-ftpd | =2.4.2_beta18_vr11 | |
wu-ftpd | =2.4.2_beta18_vr12 | |
wu-ftpd | =2.4.2_beta18_vr13 | |
wu-ftpd | =2.4.2_beta18_vr14 | |
wu-ftpd | =2.4.2_beta18_vr15 | |
wu-ftpd | =2.4.2_vr16 | |
wu-ftpd | =2.4.2_vr17 | |
wu-ftpd | =2.5.0 | |
wu-ftpd | =2.6.0 | |
wu-ftpd | =2.6.1 | |
wu-ftpd | =2.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0854 is classified as a high severity vulnerability due to its ability to be exploited remotely and consume significant system memory.
To mitigate CVE-2003-0854, upgrading to the latest version of GNU Fileutils or wu-ftpd that is not affected by this vulnerability is recommended.
CVE-2003-0854 affects GNU Fileutils versions 4.0 through 4.1.7 and wu-ftpd versions 2.4.1 through 2.6.2.
Yes, CVE-2003-0854 can be exploited locally by users through applications that invoke the 'ls' command.
While upgrading is the most effective fix for CVE-2003-0854, limiting access to vulnerable applications and restricting user permissions can serve as temporary workarounds.