CVE-2004-0396
CVS (Linux/FreeBSD) - Remote Entry Line Heap Overflow
Severity Score
7.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Heap-based buffer overflow in CVS 1.11.x up to 1.11.15, and 1.12.x up to 1.12.7, when using the pserver mechanism allows remote attackers to execute arbitrary code via Entry lines.
Desbordamiento basado en la pila en CVS 1.11.X a 1.11.5 y 1.12. a 1.12.7, cuando se usa el mecanismo pserver, permite a atacantes remotos ejecutar código arbitrario mediante lineas de Entradas.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2004-04-13 CVE Reserved
- 2004-05-19 CVE Published
- 2004-06-25 First Exploit
- 2024-06-04 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (32)
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/300 | 2004-06-25 | |
https://www.exploit-db.com/exploits/301 | 2004-06-25 |
URL | Date | SRC |
---|---|---|
http://www.debian.org/security/2004/dsa-505 | 2017-10-11 | |
http://www.kb.cert.org/vuls/id/192038 | 2017-10-11 | |
http://www.redhat.com/support/errata/RHSA-2004-190.html | 2017-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cvs Search vendor "Cvs" | Cvs Search vendor "Cvs" for product "Cvs" | 1.11 Search vendor "Cvs" for product "Cvs" and version "1.11" | - |
Affected
| ||||||
Cvs Search vendor "Cvs" | Cvs Search vendor "Cvs" for product "Cvs" | 1.12 Search vendor "Cvs" for product "Cvs" and version "1.12" | - |
Affected
|