First published: Fri Nov 19 2004(Updated: )
Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
EZ-IPUpdate by Angus Mackay | =3.0.11b5 | |
EZ-IPUpdate by Angus Mackay | =3.0.11b8 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Gentoo Linux | ||
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0980 is classified as a critical vulnerability due to its potential to allow remote code execution.
The best way to mitigate CVE-2004-0980 is to upgrade ez-ipupdate to version 3.0.11b9 or later.
CVE-2004-0980 affects ez-ipupdate versions 3.0.10 through 3.0.11b8 running in daemon mode with certain service types.
Yes, CVE-2004-0980 can be exploited remotely by attackers who can send specially crafted input to the affected service.
Failing to address CVE-2004-0980 can result in unauthorized remote code execution, leading to potential data breaches and system compromise.