Vulnerability Description
Multiple buffer overflows in auth_ident() function in auth.c for GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to gain privileges via a long string.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Anubis | 3.6.0 |
References
- http://mail.gnu.org/archive/html/bug-anubis/2004-02/msg00000.html
- http://marc.info/?l=bugtraq&m=107843915424588&w=2
- http://marc.info/?l=bugtraq&m=107894315012081&w=2
- http://www.securityfocus.com/bid/9772ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15345
- http://mail.gnu.org/archive/html/bug-anubis/2004-02/msg00000.html
- http://marc.info/?l=bugtraq&m=107843915424588&w=2
- http://marc.info/?l=bugtraq&m=107894315012081&w=2
- http://www.securityfocus.com/bid/9772ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15345
FAQ
What is CVE-2004-0353?
CVE-2004-0353 is a vulnerability with a CVSS score of 10.0 (HIGH). Multiple buffer overflows in auth_ident() function in auth.c for GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to gain privileges via a long string.
How severe is CVE-2004-0353?
CVE-2004-0353 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0353?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Anubis.