CVE-2003-0390 Affecting opt package, versions <3.19


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.04% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-OPT-264063
  • published2 Jul 2003
  • disclosed2 Jul 2003

Introduced: 2 Jul 2003

CVE-2003-0390  (opens in a new tab)

How to fix?

Upgrade Debian:10 opt to version 3.19 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream opt package and not the opt package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

Multiple buffer overflows in Options Parsing Tool (OPT) shared library 3.18 and earlier, when used in setuid programs, may allow local users to execute arbitrary code via long command line options that are fed into macros such as opt_warn_2, as used in functions such as opt_atoi.

CVSS Scores

version 3.1