CVE-2004-1628

Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pizzashack:rssh:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=109855982425122&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=109855982425122&w=2 - Third Party Advisory
References () http://secunia.com/advisories/12954 - Third Party Advisory () http://secunia.com/advisories/12954 - Third Party Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200410-28.xml - Third Party Advisory () http://www.gentoo.org/security/en/glsa/glsa-200410-28.xml - Third Party Advisory
References () http://www.pizzashack.org/rssh/ - Vendor Advisory () http://www.pizzashack.org/rssh/ - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17831 - VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/17831 - VDB Entry

Information

Published : 2004-10-23 04:00

Updated : 2024-11-20 23:51


NVD link : CVE-2004-1628

Mitre link : CVE-2004-1628

CVE.ORG link : CVE-2004-1628


JSON object : View

Products Affected

pizzashack

  • rssh
CWE
CWE-134

Use of Externally-Controlled Format String