Description
Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
Product(s):
- Angus Mackay EZ-IPUpdate 3.0.11b5
- Angus Mackay EZ-IPUpdate 3.0.11b8
- Debian Debian Linux 3.0
- Debian Linux 3.0 on Alpha
- Debian Linux 3.0 on ARM
- Debian Linux 3.0 on HPPA
- Debian Linux 3.0 on IA-32
- Debian Linux 3.0 on IA-64
- Debian Linux 3.0 on M68k
- Debian Linux 3.0 on MIPS
- Debian Linux 3.0 on MIPSEL
- Debian Linux 3.0 on PPC
- Debian Linux 3.0 on S/390
- Debian Linux 3.0 on SPARC
- Gentoo Linux
- Gentoo Linux 1.2
- Gentoo Linux 1.4
- Gentoo Linux 1.4 -
- Gentoo Linux 1.4 rc1
- Gentoo Linux 1.4 rc2
- Gentoo Linux 1.4 rc3
- Gentoo Linux 2.1.30 r9
- Gentoo Linux 2.2.28 r7
- Gentoo Linux 2.3.30 r2
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-0980, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-0980 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.