Vulnerability Description
Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code.
CVSS Score
9.0
HIGH
AV:N/AC:L/Au:S/C:C/I:C/A:C
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pizzashack | Rssh | < 2.2.2 |
Related Weaknesses (CWE)
References
- http://marc.info/?l=bugtraq&m=109855982425122&w=2Third Party Advisory
- http://secunia.com/advisories/12954Third Party Advisory
- http://www.gentoo.org/security/en/glsa/glsa-200410-28.xmlThird Party Advisory
- http://www.pizzashack.org/rssh/Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17831VDB Entry
- http://marc.info/?l=bugtraq&m=109855982425122&w=2Third Party Advisory
- http://secunia.com/advisories/12954Third Party Advisory
- http://www.gentoo.org/security/en/glsa/glsa-200410-28.xmlThird Party Advisory
- http://www.pizzashack.org/rssh/Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17831VDB Entry
FAQ
What is CVE-2004-1628?
CVE-2004-1628 is a vulnerability with a CVSS score of 9.0 (HIGH). Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code.
How severe is CVE-2004-1628?
CVE-2004-1628 has been rated HIGH with a CVSS base score of 9.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1628?
Check the references section above for vendor advisories and patch information. Affected products include: Pizzashack Rssh.