CVE-2004-1701

Heap-based buffer overflow in the AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 allows remote attackers to execute arbitrary code via a long SAUTH command during RSA authentication.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:cfengine:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.5:b1:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.5:pre:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.5:pre2:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.7:p1:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.7:p2:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.7:p3:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.0.8:p1:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.1.0:a6:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.1.0:a8:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.1.0:a9:*:*:*:*:*:*
cpe:2.3:a:gnu:cfengine:2.1.7:p1:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=109208394910086&w=2 - () http://marc.info/?l=bugtraq&m=109208394910086&w=2 -
References () http://marc.info/?l=bugtraq&m=110886670528775&w=2 - () http://marc.info/?l=bugtraq&m=110886670528775&w=2 -
References () http://secunia.com/advisories/12251 - Patch, Vendor Advisory () http://secunia.com/advisories/12251 - Patch, Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200408-08.xml - Exploit, Patch, Vendor Advisory () http://security.gentoo.org/glsa/glsa-200408-08.xml - Exploit, Patch, Vendor Advisory
References () http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 - Exploit, Patch, Vendor Advisory () http://www.coresecurity.com/common/showdoc.php?idx=387&idxseccion=10 - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/10899 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/10899 - Exploit, Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16935 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16935 -

Information

Published : 2004-08-09 04:00

Updated : 2024-11-20 23:51


NVD link : CVE-2004-1701

Mitre link : CVE-2004-1701

CVE.ORG link : CVE-2004-1701


JSON object : View

Products Affected

gnu

  • cfengine