Vulnerability Description
Buffer overflow in the chpasswd command in the Change_passwd plugin before 4.0, as used in SquirrelMail, allows local users to gain root privileges via a long user name.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Thiago Melo De Paula | Change Passwd | 3.1.1.2.8 |
References
- http://marc.info/?l=bugtraq&m=108222863917958&w=2
- http://marc.info/?l=bugtraq&m=108311782032370&w=2
- http://secunia.com/advisories/11415
- http://www.securityfocus.com/bid/10166ExploitPatchVendor Advisory
- http://www.squirrelmail.org/plugin_view.php?id=117
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15889
- http://marc.info/?l=bugtraq&m=108222863917958&w=2
- http://marc.info/?l=bugtraq&m=108311782032370&w=2
- http://secunia.com/advisories/11415
- http://www.securityfocus.com/bid/10166ExploitPatchVendor Advisory
- http://www.squirrelmail.org/plugin_view.php?id=117
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15889
FAQ
What is CVE-2004-0524?
CVE-2004-0524 is a vulnerability with a CVSS score of 10.0 (HIGH). Buffer overflow in the chpasswd command in the Change_passwd plugin before 4.0, as used in SquirrelMail, allows local users to gain root privileges via a long user name.
How severe is CVE-2004-0524?
CVE-2004-0524 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0524?
Check the references section above for vendor advisories and patch information. Affected products include: Thiago Melo De Paula Change Passwd.