Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2004-0694

Опубликовано: 04 фев. 2011
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 6.8

Описание

Buffer overflow in LHA 1.14 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to "command line processing," a different vulnerability than CVE-2004-0771. NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.

РелизСтатусПримечание
dapper

released

1.14i-10
devel

released

1.14i-10
edgy

released

1.14i-10
feisty

released

1.14i-10
upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 79%
0.01288
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

redhat
почти 21 год назад

Buffer overflow in LHA 1.14 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to "command line processing," a different vulnerability than CVE-2004-0771. NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.

nvd
больше 14 лет назад

Buffer overflow in LHA 1.14 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to "command line processing," a different vulnerability than CVE-2004-0771. NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.

debian
больше 14 лет назад

Buffer overflow in LHA 1.14 and earlier allows remote attackers to cau ...

github
около 3 лет назад

Buffer overflow in LHA 1.14 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unknown vectors related to "command line processing," a different vulnerability than CVE-2004-0771. NOTE: this issue may be REJECTED if there are not any cases in which LHA is setuid or is otherwise used across security boundaries.

fstec
почти 21 год назад

Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 79%
0.01288
Низкий

6.8 Medium

CVSS2