Unrated severityNVD Advisory· Published Nov 17, 2003· Updated Apr 16, 2026
CVE-2003-0853
CVE-2003-0853
Description
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
Affected products
26cpe:2.3:a:washington_university:wu-ftpd:2.4.1:*:*:*:*:*:*:*+ 20 more
- cpe:2.3:a:washington_university:wu-ftpd:2.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18:*:academ:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr10:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr11:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr12:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr13:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr14:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr15:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr4:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr5:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr6:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr7:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr8:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta2:*:academ:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr16:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr17:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:washington_university:wu-ftpd:2.6.2:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- www.securityfocus.com/bid/8875nvdExploitPatchVendor Advisory
- distro.conectiva.com.br/atualizacoes/nvd
- distro.conectiva.com.br/atualizacoes/nvd
- lists.grok.org.uk/pipermail/full-disclosure/2003-October/012548.htmlnvd
- secunia.com/advisories/10126nvd
- secunia.com/advisories/17069nvd
- support.avaya.com/elmodocs2/security/ASA-2005-213.pdfnvd
- www.guninski.com/binls.htmlnvd
- www.mandriva.com/security/advisoriesnvd
- www.redhat.com/support/errata/RHSA-2003-309.htmlnvd
- www.redhat.com/support/errata/RHSA-2003-310.htmlnvd
- www.securityfocus.com/advisories/6014nvd
- www.turbolinux.com/security/TLSA-2003-60.txtnvd
News mentions
0No linked articles in our index yet.