CVE-2004-0393

Format string vulnerability in the msg function for rlpr daemon (rlprd) 2.0.4 allows remote attackers to execute arbitrary code via format string specifiers in a buffer that can not be resolved, which is provided to the syslog function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rlpr:rlpr:2.0:*:*:*:*:*:*:*
cpe:2.3:a:rlpr:rlpr:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rlpr:rlpr:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:rlpr:rlpr:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:rlpr:rlpr:2.0.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=108810992313652&w=2 - () http://marc.info/?l=bugtraq&m=108810992313652&w=2 -
References () http://www.debian.org/security/2004/dsa-524 - Patch, Vendor Advisory () http://www.debian.org/security/2004/dsa-524 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/10578 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/10578 - Exploit, Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16453 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16453 -

Information

Published : 2004-12-06 05:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0393

Mitre link : CVE-2004-0393

CVE.ORG link : CVE-2004-0393


JSON object : View

Products Affected

rlpr

  • rlpr