CVE-2004-0461 : Detail

CVE-2004-0461

1.88%V3
Network
2004-06-24
02h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The DHCP daemon (DHCPD) for ISC DHCP 3.0.1rc12 and 3.0.1rc13, when compiled in environments that do not provide the vsnprintf function, uses C include files that define vsnprintf to use the less safe vsprintf function, which can lead to buffer overflow vulnerabilities that enable a denial of service (server crash) and possibly execute arbitrary code.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Infoblox>>Dns_one_appliance >> Version 2.3.1_r5

    Infoblox>>Dns_one_appliance >> Version 2.4.0.8

      Infoblox>>Dns_one_appliance >> Version 2.4.0.8a

        Isc>>Dhcpd >> Version 3.0.1

        Isc>>Dhcpd >> Version 3.0.1

        Suse>>Suse_email_server >> Version iii

          Suse>>Suse_linux_admin-cd_for_firewall >> Version *

          Suse>>Suse_linux_connectivity_server >> Version *

          Suse>>Suse_linux_database_server >> Version *

          Suse>>Suse_linux_firewall_cd >> Version *

          Suse>>Suse_linux_office_server >> Version *

          Configuraton 0

          Mandrakesoft>>Mandrake_linux >> Version 9.0

          Mandrakesoft>>Mandrake_linux >> Version 9.1

          Mandrakesoft>>Mandrake_linux >> Version 9.1

            Mandrakesoft>>Mandrake_linux >> Version 9.2

            Mandrakesoft>>Mandrake_linux >> Version 9.2

              Mandrakesoft>>Mandrake_linux >> Version 10.0

              Mandrakesoft>>Mandrake_linux >> Version 10.0

                Redhat>>Fedora_core >> Version core_2.0

                  Suse>>Suse_linux >> Version 7

                    Suse>>Suse_linux >> Version 8

                      Suse>>Suse_linux >> Version 8.0

                      Suse>>Suse_linux >> Version 8.0

                        Suse>>Suse_linux >> Version 8.1

                        Suse>>Suse_linux >> Version 8.2

                        Suse>>Suse_linux >> Version 9.0

                        Suse>>Suse_linux >> Version 9.0

                          Suse>>Suse_linux >> Version 9.1

                          References

                          http://www.kb.cert.org/vuls/id/654390
                          Tags : third-party-advisory, x_refsource_CERT-VN
                          http://www.mandriva.com/security/advisories?name=MDKSA-2004:061
                          Tags : vendor-advisory, x_refsource_MANDRAKE
                          http://secunia.com/advisories/23265
                          Tags : third-party-advisory, x_refsource_SECUNIA
                          http://marc.info/?l=bugtraq&m=108795911203342&w=2
                          Tags : mailing-list, x_refsource_BUGTRAQ
                          http://marc.info/?l=bugtraq&m=108938625206063&w=2
                          Tags : mailing-list, x_refsource_BUGTRAQ
                          http://www.securityfocus.com/bid/10591
                          Tags : vdb-entry, x_refsource_BID
                          http://www.us-cert.gov/cas/techalerts/TA04-174A.html
                          Tags : third-party-advisory, x_refsource_CERT
                          http://marc.info/?l=bugtraq&m=108843959502356&w=2
                          Tags : mailing-list, x_refsource_BUGTRAQ