10
CVSSv2

CVE-2004-0980

Published: 09/02/2005 Updated: 11/07/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 up to and including 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.

Vulnerable Product Search on Vulmon Subscribe to Product

angus mackay ez-ipupdate 3.0.11b5

angus mackay ez-ipupdate 3.0.11b8

debian debian linux 3.0

gentoo linux

Vendor Advisories

Ulf Härnhammar from the Debian Security Audit Project discovered a format string vulnerability in ez-ipupdate, a client for many dynamic DNS services This problem can only be exploited if ez-ipupdate is running in daemon mode (most likely) with many but not all service types For the stable distribution (woody) this problem has been fixed in vers ...