First published: Wed Jun 30 2004(Updated: )
Format string vulnerability in the msg function for rlpr daemon (rlprd) 2.0.4 allows remote attackers to execute arbitrary code via format string specifiers in a buffer that can not be resolved, which is provided to the syslog function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Runit | =2.0 | |
Runit | =2.0.1 | |
Runit | =2.0.2 | |
Runit | =2.0.3 | |
Runit | =2.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0393 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2004-0393, upgrade to a patched version of the rlpr daemon, specifically versions beyond 2.0.4.
CVE-2004-0393 affects rlpr daemon versions 2.0 up to 2.0.4.
CVE-2004-0393 is a format string vulnerability allowing attackers to execute arbitrary code.
Yes, CVE-2004-0393 can be exploited remotely by attackers sending specially crafted input.