Vulnerability Description
Buffer overflow in the process_menu function in yardradius 1.0.20 allows remote attackers to execute arbitrary code.
CVSS Score
10.0
HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Yard Radius | Yard Radius | 1.0.17 |
| Yard Radius Project | Yard Radius | 1.0.16 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278384
- http://www.debian.org/security/2004/dsa-598PatchVendor Advisory
- http://www.securityfocus.com/bid/11753PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18270
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278384
- http://www.debian.org/security/2004/dsa-598PatchVendor Advisory
- http://www.securityfocus.com/bid/11753PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18270
FAQ
What is CVE-2004-0987?
CVE-2004-0987 is a vulnerability with a CVSS score of 10.0 (HIGH). Buffer overflow in the process_menu function in yardradius 1.0.20 allows remote attackers to execute arbitrary code.
How severe is CVE-2004-0987?
CVE-2004-0987 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0987?
Check the references section above for vendor advisories and patch information. Affected products include: Yard Radius Yard Radius, Yard Radius Project Yard Radius.