mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/freebsd/2000-08/0336.html | patch vendor advisory |
http://www.redhat.com/support/errata/RHSA-2000-050.html | vendor advisory |
http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h | |
http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html | mailing list vendor advisory |
http://www.openbsd.org/errata.html#mopd | vendor advisory |
http://www.securityfocus.com/bid/1559 | vdb entry patch vendor advisory |