First published: Wed Oct 20 2004(Updated: )
Buffer overflow in Zinf 2.2.1 on Windows, and other older versions for Linux, allows remote attackers or local users to execute arbitrary code via certain values in a .pls file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zinf | =2.2.1 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 | |
Debian Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0964 is classified as a critical vulnerability due to its ability to allow remote code execution.
To fix CVE-2004-0964, update to a patched version of Zinf that addresses the buffer overflow issue.
CVE-2004-0964 affects Zinf version 2.2.1 on Windows and various older Linux versions of Debian 3.0.
Yes, CVE-2004-0964 can be exploited remotely via specially crafted .pls files.
A possible workaround for CVE-2004-0964 is to restrict the handling of .pls files or disable Zinf temporarily until a patch is applied.