Vulnerabilities > CVE-2004-1437 - Remote Digest Authentication Buffer Overflow vulnerability in Pavuk 0.928R1/0.928R2/0.9Pl28I
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Multiple buffer overflows in the digest authentication functionality in Pavuk 0.9.28-r2 and earlier allow remote attackers to execute arbitrary code.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Exploit-Db
description | Pavuk Digest Authentication Buffer Overflow Remote Exploit. CVE-2004-1437. Remote exploit for linux platform |
id | EDB-ID:380 |
last seen | 2016-01-31 |
modified | 2004-08-08 |
published | 2004-08-08 |
reporter | infamous41md |
source | https://www.exploit-db.com/download/380/ |
title | Pavuk Digest Authentication Buffer Overflow Remote Exploit |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200407-19.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200407-19 (Pavuk: Digest authentication helper buffer overflow) Pavuk contains several buffer overflow vulnerabilities in the code handling digest authentication. Impact : An attacker could cause a buffer overflow, leading to arbitrary code execution with the rights of the user running Pavuk. Workaround : There is no known workaround at this time. All users are encouraged to upgrade to the latest available version of Pavuk. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14552 |
published | 2004-08-30 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14552 |
title | GLSA-200407-19 : Pavuk: Digest authentication helper buffer overflow |
code |
|