Vulnerabilities > CVE-2004-1192 - Remote Security vulnerability in Citadel/UX
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Format string vulnerability in the lprintf function in Citadel/UX 6.27 and earlier allows remote attackers to execute arbitrary code via format string specifiers sent to the server.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 6 |
Exploit-Db
description | Citadel/UX <= 6.27 Remote Root Format String Exploit. CVE-2004-1192. Remote exploit for linux platform |
id | EDB-ID:681 |
last seen | 2016-01-31 |
modified | 2004-12-12 |
published | 2004-12-12 |
reporter | CoKi |
source | https://www.exploit-db.com/download/681/ |
title | Citadel/UX <= 6.27 - Remote Root Format String Exploit |
Nessus
NASL family | Gain a shell remotely |
NASL id | CITADEL_FMT_STRING.NASL |
description | The remote host is running Citadel/UX, a messaging server for Unix. There is a format string issue in the remote version of this software. A remote attacker could use this to crash the service, or execute arbitrary code. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15942 |
published | 2004-12-13 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15942 |
title | Citadel/UX lprintf() Function Remote Format String |
code |
|