First published: Mon Aug 09 2004(Updated: )
Heap-based buffer overflow in the AuthenticationDialogue function in cfservd for Cfengine 2.0.0 to 2.1.7p1 allows remote attackers to execute arbitrary code via a long SAUTH command during RSA authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CFEngine | =2.0.7-p1 | |
CFEngine | =2.0.8-p1 | |
CFEngine | =2.0.5-b1 | |
CFEngine | =2.0.8 | |
CFEngine | =2.1.0-a9 | |
CFEngine | =2.0.7 | |
CFEngine | =2.1.0-a6 | |
CFEngine | =2.0.7-p2 | |
CFEngine | =2.0.0 | |
CFEngine | =2.0.5-pre | |
CFEngine | =2.1.0-a8 | |
CFEngine | =2.0.2 | |
CFEngine | =2.0.1 | |
CFEngine | =2.0.6 | |
CFEngine | =2.0.5 | |
CFEngine | =2.0.5-pre2 | |
CFEngine | =2.0.7-p3 | |
CFEngine | =2.0.4 | |
CFEngine | =2.1.7-p1 | |
CFEngine | =2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1701 is classified as a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2004-1701, you should upgrade to a version of Cfengine that is 2.1.7p2 or later.
CVE-2004-1701 affects various versions of GNU Cfengine ranging from 2.0.0 to 2.1.7p1.
CVE-2004-1701 exploits a heap-based buffer overflow in the AuthenticationDialogue function using a long SAUTH command.
CVE-2004-1701 was discovered by security researchers, contributing to the awareness of vulnerabilities in network management systems.