CVE-2003-0028

N/A Unknown
Published: March 25, 2003 Modified: April 16, 2026
View on NVD

Description

Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote attackers to execute arbitrary code via certain integer values in length fields, a different vulnerability than CVE-2002-0391.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.cert.org/advisories/CA-2003-10.html
Source: cve@mitre.org
Patch Third Party Advisory US Government Resource
http://www.eeye.com/html/Research/Advisories/AD20030318.html
Source: cve@mitre.org
Exploit Vendor Advisory
http://www.kb.cert.org/vuls/id/516825
Source: cve@mitre.org
US Government Resource
http://marc.info/?l=bugtraq&m=104810574423662&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=104811415301340&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=104860855114117&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=104878237121402&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=105362148313082&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.cert.org/advisories/CA-2003-10.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory US Government Resource
http://www.debian.org/security/2003/dsa-266
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2003/dsa-272
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2003/dsa-282
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.eeye.com/html/Research/Advisories/AD20030318.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
http://www.kb.cert.org/vuls/id/516825
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2003:037
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2003-051.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2003-052.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2003-089.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2003-091.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/315638/30/25430/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/316931/30/25250/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/316960/30/25250/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20150122-0002/
Source: af854a3a-2127-422b-91ae-364da2661108

50 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
56.1%
98th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

openbsd cray mit sgi hp freebsd sun ibm gnu openafs