Format string vulnerability in the log_message function in lks.c in Linux Kiss Server 1.2, when background (daemon) mode is disabled, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via format string specifiers in an invalid command.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/41018 | vdb entry |
http://www.securityfocus.com/bid/28099 | vdb entry |
http://www.vashnukad.com/ | url repurposed exploit |
http://www.vupen.com/english/advisories/2008/0785 | vdb entry |
http://secunia.com/advisories/29219 | third party advisory vendor advisory |
http://marc.info/?l=full-disclosure&m=120468901813326&w=2 | mailing list exploit |