CVE-2003-0173 : Detail

CVE-2003-0173

0.04%V3
Local
2003-04-15
02h00 +00:00
2003-04-26
07h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

xfsdq in xfsdump does not create quota information files securely, which allows local users to gain root privileges.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.2 AV:L/AC:L/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Xfsdump>>Xfsdump >> Version 2.0.0

    Xfsdump>>Xfsdump >> Version 2.0.1

      Xfsdump>>Xfsdump >> Version 2.0.2

        Xfsdump>>Xfsdump >> Version 2.0.3

          Xfsdump>>Xfsdump >> Version 2.0.4

            Xfsdump>>Xfsdump >> Version 2.0.5

              Sgi>>Irix >> Version 6.5

              Sgi>>Irix >> Version 6.5.1

              Sgi>>Irix >> Version 6.5.2

              Sgi>>Irix >> Version 6.5.2f

              Sgi>>Irix >> Version 6.5.2m

              Sgi>>Irix >> Version 6.5.3

              Sgi>>Irix >> Version 6.5.3f

              Sgi>>Irix >> Version 6.5.3m

              Sgi>>Irix >> Version 6.5.4

              Sgi>>Irix >> Version 6.5.4f

              Sgi>>Irix >> Version 6.5.4m

              Sgi>>Irix >> Version 6.5.5

              Sgi>>Irix >> Version 6.5.5f

              Sgi>>Irix >> Version 6.5.5m

              Sgi>>Irix >> Version 6.5.6

              Sgi>>Irix >> Version 6.5.6f

              Sgi>>Irix >> Version 6.5.6m

              Sgi>>Irix >> Version 6.5.7

              Sgi>>Irix >> Version 6.5.7f

              Sgi>>Irix >> Version 6.5.7m

              Sgi>>Irix >> Version 6.5.8

              Sgi>>Irix >> Version 6.5.8f

              Sgi>>Irix >> Version 6.5.8m

              Sgi>>Irix >> Version 6.5.9

              Sgi>>Irix >> Version 6.5.9f

              Sgi>>Irix >> Version 6.5.9m

              Sgi>>Irix >> Version 6.5.10

              Sgi>>Irix >> Version 6.5.10f

              Sgi>>Irix >> Version 6.5.10m

              Sgi>>Irix >> Version 6.5.11

              Sgi>>Irix >> Version 6.5.11f

              Sgi>>Irix >> Version 6.5.11m

              Sgi>>Irix >> Version 6.5.12

              Sgi>>Irix >> Version 6.5.12f

              Sgi>>Irix >> Version 6.5.12m

              Sgi>>Irix >> Version 6.5.13

              Sgi>>Irix >> Version 6.5.13f

              Sgi>>Irix >> Version 6.5.13m

              Sgi>>Irix >> Version 6.5.14

              Sgi>>Irix >> Version 6.5.14f

              Sgi>>Irix >> Version 6.5.14m

              Sgi>>Irix >> Version 6.5.15

              Sgi>>Irix >> Version 6.5.15f

              Sgi>>Irix >> Version 6.5.15m

              Sgi>>Irix >> Version 6.5.16

              Sgi>>Irix >> Version 6.5.16f

              Sgi>>Irix >> Version 6.5.16m

              Sgi>>Irix >> Version 6.5.17

              Sgi>>Irix >> Version 6.5.17f

              Sgi>>Irix >> Version 6.5.17m

              Sgi>>Irix >> Version 6.5.18

              Sgi>>Irix >> Version 6.5.18f

              Sgi>>Irix >> Version 6.5.18m

              Sgi>>Irix >> Version 6.5.19

              Sgi>>Irix >> Version 6.5.19f

              Sgi>>Irix >> Version 6.5.19m

              References

              http://www.kb.cert.org/vuls/id/111673
              Tags : third-party-advisory, x_refsource_CERT-VN
              http://www.mandriva.com/security/advisories?name=MDKSA-2003:047
              Tags : vendor-advisory, x_refsource_MANDRAKE
              http://www.debian.org/security/2003/dsa-283
              Tags : vendor-advisory, x_refsource_DEBIAN