CVE-2004-0451

Source
https://nvd.nist.gov/vuln/detail/CVE-2004-0451
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2004-0451.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2004-0451
Related
Published
2004-12-06T05:00:00Z
Modified
2024-11-20T23:48:36Z
Summary
[none]
Details

Multiple format string vulnerabilities in the (1) logquit, (2) logerr, or (3) loginfo functions in Software Upgrade Protocol (SUP) allows remote attackers to execute arbitrary code via format string specifiers in messages that are logged by syslog.

References

Affected packages

Debian:11 / sup

Package

Name
sup
Purl
pkg:deb/debian/sup?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8-11

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / sup

Package

Name
sup
Purl
pkg:deb/debian/sup?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8-11

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / sup

Package

Name
sup
Purl
pkg:deb/debian/sup?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8-11

Ecosystem specific

{
    "urgency": "not yet assigned"
}