CVE-2004-0368

Double free vulnerability in dtlogin in CDE on Solaris, HP-UX, and other operating systems allows remote attackers to execute arbitrary code via a crafted XDMCP packet.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20040801-01-P
http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0064.html Vendor Advisory
http://lists.immunitysec.com/pipermail/dailydave/2004-March/000402.html Vendor Advisory
http://secunia.com/advisories/11210/ Vendor Advisory
http://secunia.com/advisories/11214/ Vendor Advisory
http://secunia.com/advisories/11495/ Vendor Advisory
http://secunia.com/advisories/11614/ Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101478-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57539-1&searchclause=security
http://www.auscert.org.au/render.html?it=4103&cid=3734
http://www.ciac.org/ciac/bulletins/o-129.shtml
http://www.immunitysec.com/downloads/dtlogin.sxw.pdf
http://www.kb.cert.org/vuls/id/179804 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/9958
https://exchange.xforce.ibmcloud.com/vulnerabilities/15581
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1436
ftp://patches.sgi.com/support/free/security/advisories/20040801-01-P
http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0064.html Vendor Advisory
http://lists.immunitysec.com/pipermail/dailydave/2004-March/000402.html Vendor Advisory
http://secunia.com/advisories/11210/ Vendor Advisory
http://secunia.com/advisories/11214/ Vendor Advisory
http://secunia.com/advisories/11495/ Vendor Advisory
http://secunia.com/advisories/11614/ Vendor Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101478-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57539-1&searchclause=security
http://www.auscert.org.au/render.html?it=4103&cid=3734
http://www.ciac.org/ciac/bulletins/o-129.shtml
http://www.immunitysec.com/downloads/dtlogin.sxw.pdf
http://www.kb.cert.org/vuls/id/179804 Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/9958
https://exchange.xforce.ibmcloud.com/vulnerabilities/15581
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1436
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:open_group:cde_common_desktop_environment:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:open_group:cde_common_desktop_environment:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:open_group:cde_common_desktop_environment:1.1:*:*:*:*:*:*:*
cpe:2.3:a:open_group:cde_common_desktop_environment:1.2:*:*:*:*:*:*:*
cpe:2.3:a:open_group:cde_common_desktop_environment:2.0:*:*:*:*:*:*:*
cpe:2.3:a:open_group:cde_common_desktop_environment:2.1:*:*:*:*:*:*:*
cpe:2.3:a:open_group:cde_common_desktop_environment:2.1.20:*:*:*:*:*:*:*
cpe:2.3:a:xi_graphics:dextop:2.1:*:*:*:*:*:*:*
cpe:2.3:a:xi_graphics:dextop:3.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*
cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20040801-01-P - () ftp://patches.sgi.com/support/free/security/advisories/20040801-01-P -
References () http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0064.html - Vendor Advisory () http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0064.html - Vendor Advisory
References () http://lists.immunitysec.com/pipermail/dailydave/2004-March/000402.html - Vendor Advisory () http://lists.immunitysec.com/pipermail/dailydave/2004-March/000402.html - Vendor Advisory
References () http://secunia.com/advisories/11210/ - Vendor Advisory () http://secunia.com/advisories/11210/ - Vendor Advisory
References () http://secunia.com/advisories/11214/ - Vendor Advisory () http://secunia.com/advisories/11214/ - Vendor Advisory
References () http://secunia.com/advisories/11495/ - Vendor Advisory () http://secunia.com/advisories/11495/ - Vendor Advisory
References () http://secunia.com/advisories/11614/ - Vendor Advisory () http://secunia.com/advisories/11614/ - Vendor Advisory
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101478-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101478-1 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-57539-1&searchclause=security - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-57539-1&searchclause=security -
References () http://www.auscert.org.au/render.html?it=4103&cid=3734 - () http://www.auscert.org.au/render.html?it=4103&cid=3734 -
References () http://www.ciac.org/ciac/bulletins/o-129.shtml - () http://www.ciac.org/ciac/bulletins/o-129.shtml -
References () http://www.immunitysec.com/downloads/dtlogin.sxw.pdf - () http://www.immunitysec.com/downloads/dtlogin.sxw.pdf -
References () http://www.kb.cert.org/vuls/id/179804 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/179804 - Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/9958 - () http://www.securityfocus.com/bid/9958 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/15581 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/15581 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1436 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1436 -

Information

Published : 2004-05-04 04:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0368

Mitre link : CVE-2004-0368

CVE.ORG link : CVE-2004-0368


JSON object : View

Products Affected

ibm

  • aix

xi_graphics

  • dextop

open_group

  • cde_common_desktop_environment
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer