Vulnerabilities > CVE-2003-0689 - Unspecified vulnerability in Redhat Enterprise Linux 2.1

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
redhat
nessus

Summary

The getgrouplist function in GNU libc (glibc) 2.2.4 and earlier allows attackers to cause a denial of service (segmentation fault) and execute arbitrary code when a user is a member of a large number of groups, which can cause a buffer overflow.

Vulnerable Configurations

Part Description Count
OS
Redhat
6

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2003-107.NASL
    descriptionA bug was discovered in the getgrouplist function in glibc that can cause a buffer overflow if the size of the group list is too small to hold all the user
    last seen2020-06-01
    modified2020-06-02
    plugin id14089
    published2004-07-31
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14089
    titleMandrake Linux Security Advisory : glibc (MDKSA-2003:107)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2003-249.NASL
    descriptionUpdated glibc packages that fix a number of bugs as well as a buffer overflow issue are now available. The GNU libc package (known as glibc) contains the standard C libraries used by applications. A bug in the getgrouplist function can cause a buffer overflow if the size of the group list is too small to hold all the user
    last seen2020-06-01
    modified2020-06-02
    plugin id12414
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/12414
    titleRHEL 2.1 : glibc (RHSA-2003:249)

Redhat

advisories
  • rhsa
    idRHSA-2003:249
  • rhsa
    idRHSA-2003:325