First published: Wed Jun 30 2004(Updated: )
Multiple format string vulnerabilities in the (1) logquit, (2) logerr, or (3) loginfo functions in Software Upgrade Protocol (SUP) allows remote attackers to execute arbitrary code via format string specifiers in messages that are logged by syslog.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Supmua Sup | =1.8 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0451 is considered high severity due to its potential to allow remote code execution.
To fix CVE-2004-0451, you should update the affected Software Upgrade Protocol (SUP) to a patched version.
CVE-2004-0451 affects Software Upgrade Protocol (SUP) version 1.8 and Debian Linux version 3.0 on various architectures.
Exploiting CVE-2004-0451 can lead to arbitrary code execution, compromising the integrity of the affected system.
Users and organizations running vulnerable versions of Software Upgrade Protocol (SUP) or Debian Linux version 3.0 are at risk due to CVE-2004-0451.