First published: Wed Dec 15 2004(Updated: )
Format string vulnerability in the lprintf function in Citadel/UX 6.27 and earlier allows remote attackers to execute arbitrary code via format string specifiers sent to the server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citadel | =6.26 | |
Citadel | =6.08 | |
Citadel | =6.24 | |
Citadel | =6.23 | |
Citadel | =6.27 | |
Citadel | =6.07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1192 has a high severity rating due to its potential to allow remote code execution by attackers.
To fix CVE-2004-1192, upgrade to a version of Citadel/UX later than 6.27 that addresses this vulnerability.
CVE-2004-1192 affects Citadel/UX versions 6.26 and earlier, including 6.08, 6.23, 6.24, and 6.27.
CVE-2004-1192 is a format string vulnerability specifically affecting the lprintf function.
Yes, CVE-2004-1192 can be exploited remotely through specially crafted inputs to the affected service.