Vulnerability Description
Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Angus Mackay | Ez-Ipupdate | 3.0.11b5 |
| Debian | Debian Linux | 3.0 |
| Gentoo | Linux | All versions |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028590.html
- http://secunia.com/advisories/13167/
- http://www.debian.org/security/2004/dsa-592
- http://www.gentoo.org/security/en/glsa/glsa-200411-20.xmlPatchVendor Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:129
- http://www.securityfocus.com/bid/11657PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18032
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/028590.html
- http://secunia.com/advisories/13167/
- http://www.debian.org/security/2004/dsa-592
- http://www.gentoo.org/security/en/glsa/glsa-200411-20.xmlPatchVendor Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:129
- http://www.securityfocus.com/bid/11657PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18032
FAQ
What is CVE-2004-0980?
CVE-2004-0980 is a vulnerability with a CVSS score of 10.0 (HIGH). Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
How severe is CVE-2004-0980?
CVE-2004-0980 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0980?
Check the references section above for vendor advisories and patch information. Affected products include: Angus Mackay Ez-Ipupdate, Debian Debian Linux, Gentoo Linux.