Vulnerability Description
Buffer overflow in Open Dc Hub 0.7.14 allows remote attackers, with administrator privileges, to execute arbitrary code via a long RedirectAll command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open Dc Hub | Direct Connect Peer-To-Peer Client | 0.7.14 |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029383.html
- http://marc.info/?l=bugtraq&m=110144606411674&w=2
- http://www.gentoo.org/security/en/glsa/glsa-200411-37.xml
- http://www.securityfocus.com/bid/11747ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18254
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029383.html
- http://marc.info/?l=bugtraq&m=110144606411674&w=2
- http://www.gentoo.org/security/en/glsa/glsa-200411-37.xml
- http://www.securityfocus.com/bid/11747ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18254
FAQ
What is CVE-2004-1127?
CVE-2004-1127 is a vulnerability with a CVSS score of 10.0 (HIGH). Buffer overflow in Open Dc Hub 0.7.14 allows remote attackers, with administrator privileges, to execute arbitrary code via a long RedirectAll command.
How severe is CVE-2004-1127?
CVE-2004-1127 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1127?
Check the references section above for vendor advisories and patch information. Affected products include: Open Dc Hub Direct Connect Peer-To-Peer Client.