First published: Thu Mar 18 2004(Updated: )
Multiple format string vulnerabilities in GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to execute arbitrary code via format string specifiers in strings passed to (1) the info function in log.c, (2) the anubis_error function in errs.c, or (3) the ssl_error function in ssl.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Anubis | =3.9.92 | |
GNU Anubis | =3.9.93 | |
GNU Anubis | =3.6.0 | |
GNU Anubis | =3.6.1 | |
GNU Anubis | =3.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0354 is classified as a critical vulnerability due to the potential for remote attackers to execute arbitrary code.
CVE-2004-0354 affects GNU Anubis versions 3.6.0 through 3.6.2, as well as 3.9.92 and 3.9.93.
To fix CVE-2004-0354, upgrade GNU Anubis to a version that is not vulnerable, such as any release after 3.9.93.
CVE-2004-0354 includes multiple format string vulnerabilities in various functions of GNU Anubis.
Yes, CVE-2004-0354 can be exploited remotely via specially crafted format string specifiers.