First published: Tue Jul 06 2004(Updated: )
Stack-based buffer overflow in pavuk 0.9pl28, 0.9pl27, and possibly other versions allows remote web sites to execute arbitrary code via a long HTTP Location header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pavuk | =0.9pl28i | |
Pavuk | =0.928r1 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Gentoo Linux | =1.4-rc1 | |
Debian GNU/Linux | =3.0 | |
Gentoo Linux | =1.4-rc3 | |
Debian GNU/Linux | =3.0 | |
Gentoo Linux | =1.1a | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Gentoo Linux | =1.4 | |
Gentoo Linux | =1.2 | |
Gentoo Linux | =1.4-rc2 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0456 is classified as a high severity vulnerability due to its ability to allow remote code execution via a stack-based buffer overflow.
To fix CVE-2004-0456, you should update Pavuk to the latest version that is not vulnerable or apply available patches from your Linux distribution.
CVE-2004-0456 is caused by a stack-based buffer overflow in Pavuk, which occurs when processing a lengthy HTTP Location header.
CVE-2004-0456 affects Pavuk versions 0.9pl28, 0.9pl27, and possibly other versions directly.
CVE-2004-0456 primarily affects Pavuk, but it may impact applications or environments that utilize vulnerable versions of Pavuk.