VYPR
Unrated severityNVD Advisory· Published Aug 27, 2003· Updated Apr 16, 2026

CVE-2003-0671

CVE-2003-0671

Description

Format string vulnerability in tcpflow, when used in a setuid context, allows local users to execute arbitrary code via the device name argument, as demonstrated in Sustworks IPNetSentryX and IPNetMonitorX the setuid program RunTCPFlow.

Affected products

4
  • cpe:2.3:a:jeremy_elson:tcpflow:0.10:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:jeremy_elson:tcpflow:0.10:*:*:*:*:*:*:*
    • cpe:2.3:a:jeremy_elson:tcpflow:0.11:*:*:*:*:*:*:*
    • cpe:2.3:a:jeremy_elson:tcpflow:0.12:*:*:*:*:*:*:*
    • cpe:2.3:a:jeremy_elson:tcpflow:0.20:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.