Unrated severityNVD Advisory· Published Aug 27, 2003· Updated Apr 16, 2026
CVE-2003-0671
CVE-2003-0671
Description
Format string vulnerability in tcpflow, when used in a setuid context, allows local users to execute arbitrary code via the device name argument, as demonstrated in Sustworks IPNetSentryX and IPNetMonitorX the setuid program RunTCPFlow.
Affected products
4cpe:2.3:a:jeremy_elson:tcpflow:0.10:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:jeremy_elson:tcpflow:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:jeremy_elson:tcpflow:0.11:*:*:*:*:*:*:*
- cpe:2.3:a:jeremy_elson:tcpflow:0.12:*:*:*:*:*:*:*
- cpe:2.3:a:jeremy_elson:tcpflow:0.20:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.atstake.com/research/advisories/2003/a080703-1.txtnvdExploitPatchVendor Advisory
- www.atstake.com/research/advisories/2003/a080703-2.txtnvd
News mentions
0No linked articles in our index yet.