Format string vulnerability in ISDN Point to Point Protocol (PPP) daemon (ipppd) in the ISDN4Linux (i4l) package allows local users to gain root privileges via format strings in the device name command line argument, which is not properly handled in a call to syslog.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0068.html | Exploit Vendor Advisory |
http://www.iss.net/security_center/static/9811.php | Patch Vendor Advisory |
http://www.securityfocus.com/bid/5437 | Exploit Patch Vendor Advisory |
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0068.html | Exploit Vendor Advisory |
http://www.iss.net/security_center/static/9811.php | Patch Vendor Advisory |
http://www.securityfocus.com/bid/5437 | Exploit Patch Vendor Advisory |
Configurations
History
20 Nov 2024, 23:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0068.html - Exploit, Vendor Advisory | |
References | () http://www.iss.net/security_center/static/9811.php - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/5437 - Exploit, Patch, Vendor Advisory |
Information
Published : 2002-09-05 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2002-0851
Mitre link : CVE-2002-0851
CVE.ORG link : CVE-2002-0851
JSON object : View
Products Affected
isdn4linux
- isdn4linux
CWE