Vulnerability Details CVE-2004-0418
serve_notify in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16, does not properly handle empty data lines, which may allow remote attackers to perform an "out-of-bounds" write for a single byte to execute arbitrary code or modify critical program data.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.143
EPSS Ranking 94.0%
CVSS Severity
CVSS v2 Score 10.0
Products affected by CVE-2004-0418
-
-
-
-
-
cpe:2.3:a:cvs:cvs:1.11.10
-
cpe:2.3:a:cvs:cvs:1.11.11
-
cpe:2.3:a:cvs:cvs:1.11.14
-
cpe:2.3:a:cvs:cvs:1.11.15
-
cpe:2.3:a:cvs:cvs:1.11.16
-
Cvs
»
Cvs
»
Version: 1.11.1_p1
cpe:2.3:a:cvs:cvs:1.11.1_p1
-
-
-
-
-
-
-
-
-
-
-
cpe:2.3:a:openpkg:openpkg:-
-
cpe:2.3:a:openpkg:openpkg:1.0
-
cpe:2.3:a:openpkg:openpkg:1.1
-
cpe:2.3:a:openpkg:openpkg:1.1.0
-
cpe:2.3:a:openpkg:openpkg:1.2
-
cpe:2.3:a:openpkg:openpkg:1.2.0
-
cpe:2.3:a:openpkg:openpkg:1.3
-
cpe:2.3:a:openpkg:openpkg:1.3.3
-
cpe:2.3:a:openpkg:openpkg:1.3.5
-
cpe:2.3:a:openpkg:openpkg:2.0
-
cpe:2.3:a:openpkg:openpkg:2.1
-
cpe:2.3:a:openpkg:openpkg:2.2
-
cpe:2.3:a:openpkg:openpkg:2.5
-
cpe:2.3:a:sgi:propack:2.4
-
cpe:2.3:a:sgi:propack:3.0
-
cpe:2.3:o:gentoo:linux:1.4
-
cpe:2.3:o:openbsd:openbsd:-
-
cpe:2.3:o:openbsd:openbsd:2.0
-
cpe:2.3:o:openbsd:openbsd:2.1
-
cpe:2.3:o:openbsd:openbsd:2.2
-
cpe:2.3:o:openbsd:openbsd:2.3
-
cpe:2.3:o:openbsd:openbsd:2.4
-
cpe:2.3:o:openbsd:openbsd:2.5
-
cpe:2.3:o:openbsd:openbsd:2.6
-
cpe:2.3:o:openbsd:openbsd:2.7
-
cpe:2.3:o:openbsd:openbsd:2.8
-
cpe:2.3:o:openbsd:openbsd:2.9
-
cpe:2.3:o:openbsd:openbsd:3.0
-
cpe:2.3:o:openbsd:openbsd:3.1
-
cpe:2.3:o:openbsd:openbsd:3.2
-
cpe:2.3:o:openbsd:openbsd:3.3
-
cpe:2.3:o:openbsd:openbsd:3.4
-
cpe:2.3:o:openbsd:openbsd:3.5
-
cpe:2.3:o:openbsd:openbsd:3.6
-
cpe:2.3:o:openbsd:openbsd:3.7
-
cpe:2.3:o:openbsd:openbsd:3.8
-
cpe:2.3:o:openbsd:openbsd:3.9
-
cpe:2.3:o:openbsd:openbsd:4.0
-
cpe:2.3:o:openbsd:openbsd:4.1
-
cpe:2.3:o:openbsd:openbsd:4.2
-
cpe:2.3:o:openbsd:openbsd:4.3
-
cpe:2.3:o:openbsd:openbsd:4.4
-
cpe:2.3:o:openbsd:openbsd:4.5
-
cpe:2.3:o:openbsd:openbsd:4.6
-
cpe:2.3:o:openbsd:openbsd:4.7
-
cpe:2.3:o:openbsd:openbsd:4.8
-
cpe:2.3:o:openbsd:openbsd:4.9
-
cpe:2.3:o:openbsd:openbsd:5.0
-
cpe:2.3:o:openbsd:openbsd:5.1
-
cpe:2.3:o:openbsd:openbsd:5.2
-
cpe:2.3:o:openbsd:openbsd:5.3
-
cpe:2.3:o:openbsd:openbsd:5.4
-
cpe:2.3:o:openbsd:openbsd:5.5
-
cpe:2.3:o:openbsd:openbsd:5.6
-
cpe:2.3:o:openbsd:openbsd:5.7
-
cpe:2.3:o:openbsd:openbsd:5.8
-
cpe:2.3:o:openbsd:openbsd:5.9
-
cpe:2.3:o:openbsd:openbsd:6.0
-
cpe:2.3:o:openbsd:openbsd:6.1
-
cpe:2.3:o:openbsd:openbsd:6.2
-
cpe:2.3:o:openbsd:openbsd:6.3
-
cpe:2.3:o:openbsd:openbsd:6.4
-
cpe:2.3:o:openbsd:openbsd:6.5
-
cpe:2.3:o:openbsd:openbsd:6.6
-
cpe:2.3:o:openbsd:openbsd:6.7
-
cpe:2.3:o:openbsd:openbsd:6.9
-
cpe:2.3:o:openbsd:openbsd:7.0
-
cpe:2.3:o:openbsd:openbsd:7.1
-
cpe:2.3:o:openbsd:openbsd:7.2
-
cpe:2.3:o:openbsd:openbsd:7.3
-
cpe:2.3:o:openbsd:openbsd:8.0