First published: Fri Nov 21 2003(Updated: )
OpenBSD kernel 3.3 and 3.4 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code in 3.4 via a program with an invalid header that is not properly handled by (1) ibcs2_exec.c in the iBCS2 emulation (compat_ibcs2) or (2) exec_elf.c, which leads to a stack-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | =3.3 | |
OpenBSD | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0955 is classified as a high severity vulnerability due to its potential to cause a denial of service and execute arbitrary code.
To mitigate CVE-2003-0955, upgrade to OpenBSD versions later than 3.4 that address this vulnerability.
CVE-2003-0955 affects local users on systems running OpenBSD versions 3.3 and 3.4.
CVE-2003-0955 can be exploited through crafted programs with invalid headers that lead to kernel panics.
The consequences of CVE-2003-0955 can include a system crash or the execution of arbitrary code on vulnerable OpenBSD systems.