Lucene search

K
cve[email protected]CVE-2004-1471
HistoryFeb 13, 2005 - 5:00 a.m.

CVE-2004-1471

2005-02-1305:00:00
web.nvd.nist.gov
26
cve
2004
1471
vulnerability
format string
cvs
denial of service
code execution

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:S/C:C/I:C/A:C

7.7 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.3%

Format string vulnerability in wrapper.c in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16 allows remote attackers with CVSROOT commit access to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in a wrapper line.

Affected configurations

NVD
Node
cvscvsMatch1.10.7
OR
cvscvsMatch1.10.8
OR
cvscvsMatch1.11
OR
cvscvsMatch1.11.1
OR
cvscvsMatch1.11.1_p1
OR
cvscvsMatch1.11.2
OR
cvscvsMatch1.11.3
OR
cvscvsMatch1.11.4
OR
cvscvsMatch1.11.5
OR
cvscvsMatch1.11.6
OR
cvscvsMatch1.11.10
OR
cvscvsMatch1.11.11
OR
cvscvsMatch1.11.14
OR
cvscvsMatch1.11.15
OR
cvscvsMatch1.11.16
OR
cvscvsMatch1.12.1
OR
cvscvsMatch1.12.2
OR
cvscvsMatch1.12.5
OR
cvscvsMatch1.12.7
OR
cvscvsMatch1.12.8
OR
openpkgopenpkgMatch1.3
OR
openpkgopenpkgMatch2.0
OR
openpkgopenpkgMatchcurrent
OR
sgipropackMatch2.4
OR
sgipropackMatch3.0
Node
freebsdfreebsdMatch1.1.5.1
OR
freebsdfreebsdMatch2.0
OR
freebsdfreebsdMatch2.0.5
OR
freebsdfreebsdMatch2.1.0
OR
freebsdfreebsdMatch2.1.5
OR
freebsdfreebsdMatch2.1.6
OR
freebsdfreebsdMatch2.1.6.1
OR
freebsdfreebsdMatch2.1.7.1
OR
freebsdfreebsdMatch2.2
OR
freebsdfreebsdMatch2.2.2
OR
freebsdfreebsdMatch2.2.3
OR
freebsdfreebsdMatch2.2.4
OR
freebsdfreebsdMatch2.2.5
OR
freebsdfreebsdMatch2.2.6
OR
freebsdfreebsdMatch2.2.8
OR
freebsdfreebsdMatch3.0
OR
freebsdfreebsdMatch3.0releng
OR
freebsdfreebsdMatch3.1
OR
freebsdfreebsdMatch3.2
OR
freebsdfreebsdMatch3.3
OR
freebsdfreebsdMatch3.4
OR
freebsdfreebsdMatch3.5
OR
freebsdfreebsdMatch3.5stable
OR
freebsdfreebsdMatch3.5.1
OR
freebsdfreebsdMatch3.5.1release
OR
freebsdfreebsdMatch3.5.1stable
OR
freebsdfreebsdMatch4.0
OR
freebsdfreebsdMatch4.0alpha
OR
freebsdfreebsdMatch4.0releng
OR
freebsdfreebsdMatch4.1
OR
freebsdfreebsdMatch4.1.1
OR
freebsdfreebsdMatch4.1.1release
OR
freebsdfreebsdMatch4.1.1stable
OR
freebsdfreebsdMatch4.2
OR
freebsdfreebsdMatch4.2stable
OR
freebsdfreebsdMatch4.3
OR
freebsdfreebsdMatch4.3release
OR
freebsdfreebsdMatch4.3release_p38
OR
freebsdfreebsdMatch4.3releng
OR
freebsdfreebsdMatch4.3stable
OR
freebsdfreebsdMatch4.4
OR
freebsdfreebsdMatch4.4release_p42
OR
freebsdfreebsdMatch4.4releng
OR
freebsdfreebsdMatch4.4stable
OR
freebsdfreebsdMatch4.5
OR
freebsdfreebsdMatch4.5release
OR
freebsdfreebsdMatch4.5release_p32
OR
freebsdfreebsdMatch4.5releng
OR
freebsdfreebsdMatch4.5stable
OR
freebsdfreebsdMatch4.6
OR
freebsdfreebsdMatch4.6release
OR
freebsdfreebsdMatch4.6release_p20
OR
freebsdfreebsdMatch4.6releng
OR
freebsdfreebsdMatch4.6stable
OR
freebsdfreebsdMatch4.6.2
OR
freebsdfreebsdMatch4.7
OR
freebsdfreebsdMatch4.7release
OR
freebsdfreebsdMatch4.7release_p17
OR
freebsdfreebsdMatch4.7releng
OR
freebsdfreebsdMatch4.7stable
OR
freebsdfreebsdMatch4.8
OR
freebsdfreebsdMatch4.8pre-release
OR
freebsdfreebsdMatch4.8release_p6
OR
freebsdfreebsdMatch4.8releng
OR
freebsdfreebsdMatch4.9
OR
freebsdfreebsdMatch4.9pre-release
OR
freebsdfreebsdMatch4.9releng
OR
freebsdfreebsdMatch4.10
OR
freebsdfreebsdMatch4.10release
OR
freebsdfreebsdMatch4.10releng
OR
freebsdfreebsdMatch5.0
OR
freebsdfreebsdMatch5.0alpha
OR
freebsdfreebsdMatch5.0release_p14
OR
freebsdfreebsdMatch5.0releng
OR
freebsdfreebsdMatch5.1
OR
freebsdfreebsdMatch5.1alpha
OR
freebsdfreebsdMatch5.1release
OR
freebsdfreebsdMatch5.1release_p5
OR
freebsdfreebsdMatch5.1releng
OR
freebsdfreebsdMatch5.2
OR
freebsdfreebsdMatch5.2.1release
OR
freebsdfreebsdMatch5.2.1releng
OR
gentoolinuxMatch1.4
OR
openbsdopenbsdMatch3.4
OR
openbsdopenbsdMatch3.5
OR
openbsdopenbsdMatchcurrent

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:S/C:C/I:C/A:C

7.7 High

AI Score

Confidence

High

0.014 Low

EPSS

Percentile

86.3%

Related for CVE-2004-1471