Unknown vulnerability in apcupsd before 3.8.6, and 3.10.x before 3.10.5, allows remote attackers to gain root privileges, possibly via format strings in a request to a slave server.
References
Link | Resource |
---|---|
http://cvs.sourceforge.net/cgi-bin/viewcvs.cgi/apcupsd/apcupsd/src/apcnisd.c.diff?r1=1.5&r2=1.6 | Broken Link Vendor Advisory |
http://www.debian.org/security/2003/dsa-277 | Patch Vendor Advisory |
http://hsj.shadowpenguin.org/misc/apcupsd_exp.txt | Broken Link |
http://sourceforge.net/project/shownotes.php?release_id=137900 | Broken Link |
http://www.novell.com/linux/security/advisories/2003_022_apcupsd.html | Broken Link |
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-015.0.txt | Broken Link |
http://www.securityfocus.com/bid/7200 | Third Party Advisory VDB Entry |
http://www.iss.net/security_center/static/11334.php | Broken Link |
http://securitytracker.com/id?1006108 | Third Party Advisory VDB Entry |
http://www.mandriva.com/security/advisories?name=MDKSA-2003:018 | Third Party Advisory |
http://www.securityfocus.com/bid/6828 | Third Party Advisory VDB Entry |
Information
Published : 2003-03-02 21:00
Updated : 2018-09-26 08:59
NVD link : CVE-2003-0098
Mitre link : CVE-2003-0098
JSON object : View
CWE
Products Affected
debian
- debian_linux
apcupsd
- apcupsd