Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=109855982425122&w=2 | Third Party Advisory |
http://secunia.com/advisories/12954 | Third Party Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200410-28.xml | Third Party Advisory |
http://www.pizzashack.org/rssh/ | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17831 | VDB Entry |
http://marc.info/?l=bugtraq&m=109855982425122&w=2 | Third Party Advisory |
http://secunia.com/advisories/12954 | Third Party Advisory |
http://www.gentoo.org/security/en/glsa/glsa-200410-28.xml | Third Party Advisory |
http://www.pizzashack.org/rssh/ | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17831 | VDB Entry |
Configurations
History
No history.
Information
Published : 2004-10-23 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-1628
Mitre link : CVE-2004-1628
CVE.ORG link : CVE-2004-1628
JSON object : View
Products Affected
pizzashack
- rssh
CWE
CWE-134
Use of Externally-Controlled Format String