{ "id": "CVE-2004-1484", "sourceIdentifier": "cve@mitre.org", "published": "2004-12-31T05:00:00.000", "lastModified": "2024-11-20T23:51:00.013", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in the _msg function in error.c in socat 1.4.0.3 and earlier, when used as an HTTP proxy client and run with the -ly option, allows remote attackers or local users to execute arbitrary code via format string specifiers in a syslog message." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8285A2C9-7D6D-4021-8933-B7B6D475C82D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.0.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "298F44AA-8FE6-4691-BA54-EA2B8DF324BA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "B24C6460-03B3-4F9E-851A-17BCC3C89C38" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "D67A37A3-80B0-4303-B989-55CE94055E23" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1F84E40-E5F6-4D3C-ABDA-AC08E280D94A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "ACCD96D5-3C45-4A2D-AD04-B8025D46E0D8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C7EB6710-19BA-439E-A2B2-F942B0D7A16D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C79DBCF-C2F9-4ADC-8FF8-E05281380BA7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE937BED-F23A-44E8-AF12-1C1F2F650036" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0CE81D4-AAA5-4003-9150-27B688141247" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A698DB94-1464-4918-AFC3-B60ACD58E007" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F7C6A33-4CFD-460C-BBD5-3C9319617A9C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "44E060A9-3CDF-46E7-85F4-F39CF2BC5FF3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8094E017-A24C-44B6-A3BE-FF81659D290B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0BE5B9D8-DBCD-457A-A0D9-A1A7DD960116" }, { "vulnerable": true, "criteria": "cpe:2.3:a:socat:socat:1.4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "795CDC03-4C48-42A6-A69C-DCFB4C2122B9" } ] } ] } ], "references": [ { "url": "http://secunia.com/advisories/12936/", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.dest-unreach.org/socat/advisory/socat-adv-1.html", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-26.xml", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.nosystem.com.ar/advisories/advisory-07.txt", "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/11505", "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17822", "source": "cve@mitre.org" }, { "url": "http://secunia.com/advisories/12936/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.dest-unreach.org/socat/advisory/socat-adv-1.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-26.xml", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.nosystem.com.ar/advisories/advisory-07.txt", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/11505", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17822", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }