First published: Fri Nov 19 2004(Updated: )
Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Angus Mackay Ez-ipupdate | =3.0.11b5 | |
Angus Mackay Ez-ipupdate | =3.0.11b8 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Gentoo Linux | ||
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.