Format string vulnerability in the msg command (cat_message function in msg.c) in OpenFTPD 0.30.2 and earlier allows remote authenticated users to execute arbitrary code via format string specifiers in the message argument.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2004-08/0017.html | mailing list exploit |
http://secunia.com/advisories/12174 | third party advisory patch vendor advisory |
http://securitytracker.com/id?1010823 | exploit vdb entry patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16843 | vdb entry |
http://www.openftpd.org:9673/openftpd | |
http://archives.neohapsis.com/archives/bugtraq/2004-07/0350.html | mailing list patch |
http://www.osvdb.org/8261 | vdb entry |
http://www.securityfocus.com/bid/10830 | exploit vdb entry patch |