CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
77.9%
Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
Vendor | Product | Version | CPE |
---|---|---|---|
angus_mackay | ez-ipupdate | 3.0.11b5 | cpe:2.3:a:angus_mackay:ez-ipupdate:3.0.11b5:*:*:*:*:*:*:* |
angus_mackay | ez-ipupdate | 3.0.11b8 | cpe:2.3:a:angus_mackay:ez-ipupdate:3.0.11b8:*:*:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:* |
lists.grok.org.uk/pipermail/full-disclosure/2004-November/028590.html
secunia.com/advisories/13167/
www.debian.org/security/2004/dsa-592
www.gentoo.org/security/en/glsa/glsa-200411-20.xml
www.mandriva.com/security/advisories?name=MDKSA-2004:129
www.securityfocus.com/bid/11657
exchange.xforce.ibmcloud.com/vulnerabilities/18032