Vulnerabilities > CVE-2004-1282 - Unspecified vulnerability in Linpopup 1.2

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
linpopup
critical
nessus
exploit available

Summary

Buffer overflow in the strexpand function in string.c for LinPopUp 1.2.0 allows remote attackers to execute arbitrary code via a crafted message that is not properly handled during a Reply operation.

Vulnerable Configurations

Part Description Count
Application
Linpopup
1

Exploit-Db

descriptionLinPopUp 1.2 Remote Buffer Overflow Vulnerability. CVE-2004-1282. Remote exploit for linux platform
idEDB-ID:25008
last seen2016-02-03
modified2004-12-15
published2004-12-15
reporterStephen Dranger
sourcehttps://www.exploit-db.com/download/25008/
titleLinPopUp 1.2 - Remote Buffer Overflow Vulnerability

Nessus

  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-632.NASL
    descriptionStephen Dranger discovered a buffer overflow in linpopup, an X11 port of winpopup, running over Samba, that could lead to the execution of arbitrary code when displaying a maliciously crafted message.
    last seen2020-06-01
    modified2020-06-02
    plugin id16129
    published2005-01-12
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16129
    titleDebian DSA-632-1 : linpopup - buffer overflow
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200501-01.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200501-01 (LinPopUp: Buffer overflow in message reply) Stephen Dranger discovered that LinPopUp contains a buffer overflow in string.c, triggered when replying to a remote user message. Impact : A remote attacker could craft a malicious message that, when replied using LinPopUp, would exploit the buffer overflow. This would result in the execution of arbitrary code with the privileges of the user running LinPopUp. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id16392
    published2005-02-14
    reporterThis script is Copyright (C) 2005-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/16392
    titleGLSA-200501-01 : LinPopUp: Buffer overflow in message reply