First published: Wed Jun 30 2004(Updated: )
Buffer overflow in the msg function for rlpr daemon (rlprd) 2.04 allows local users to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Runit | =2.0.2 | |
Runit | =2.0.1 | |
Runit | =2.0 | |
Runit | =2.0.4 | |
Runit | =2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0454 has a high severity due to the potential for local users to execute arbitrary code through a buffer overflow.
To fix CVE-2004-0454, you should upgrade to a patched version of the rlpr daemon that is not susceptible to this vulnerability.
CVE-2004-0454 affects rlpr versions 2.0, 2.0.1, 2.0.2, 2.0.3, and 2.0.4.
CVE-2004-0454 cannot be exploited remotely as it requires local access to the vulnerable system.
Yes, CVE-2004-0454 is a known vulnerability associated with the rlpr daemon within Runit.