Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028590.html - | |
References | () http://secunia.com/advisories/13167/ - | |
References | () http://www.debian.org/security/2004/dsa-592 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200411-20.xml - Patch, Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2004:129 - | |
References | () http://www.securityfocus.com/bid/11657 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18032 - |
Information
Published : 2005-02-09 05:00
Updated : 2024-11-20 23:49
NVD link : CVE-2004-0980
Mitre link : CVE-2004-0980
CVE.ORG link : CVE-2004-0980
JSON object : View
Products Affected
debian
- debian_linux
angus_mackay
- ez-ipupdate
gentoo
- linux
CWE