Format string vulnerability in the log_message function in lks.c in Linux Kiss Server 1.2, when background (daemon) mode is disabled, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in an invalid command.
References
Link | Resource |
---|---|
http://marc.info/?l=full-disclosure&m=120468901813326&w=2 | Exploit |
http://secunia.com/advisories/29219 | Vendor Advisory |
http://www.securityfocus.com/bid/28099 | |
http://www.vashnukad.com/ | Exploit URL Repurposed |
http://www.vupen.com/english/advisories/2008/0785 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41018 |
Configurations
History
No history.
Information
Published : 2008-03-08 00:44
Updated : 2024-02-14 01:17
NVD link : CVE-2008-1206
Mitre link : CVE-2008-1206
CVE.ORG link : CVE-2008-1206
JSON object : View
Products Affected
linux_kiss_server
- linux_kiss_server
CWE
CWE-134
Use of Externally-Controlled Format String