Format string vulnerability in ez-ipupdate.c for ez-ipupdate 3.0.10 through 3.0.11b8, when running in daemon mode with certain service types in use, allows remote servers to execute arbitrary code.
2005-02-09T05:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 10.0 (HIGH)
AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | angus_mackay | ez-ipupdate | 3.0.11b5 | Yes |
Application | angus_mackay | ez-ipupdate | 3.0.11b8 | Yes |
Operating System | debian | debian_linux | 3.0 | Yes |
Operating System | debian | debian_linux | 3.0 | Yes |
Operating System | debian | debian_linux | 3.0 | Yes |
Operating System | debian | debian_linux | 3.0 | Yes |
Operating System | debian | debian_linux | 3.0 | Yes |
Operating System | debian | debian_linux | 3.0 | Yes |
Operating System | debian | debian_linux | 3.0 | Yes |
Operating System | debian | debian_linux | 3.0 | Yes |
Operating System | debian | debian_linux | 3.0 | Yes |
Operating System | debian | debian_linux | 3.0 | Yes |
Operating System | debian | debian_linux | 3.0 | Yes |
Operating System | debian | debian_linux | 3.0 | Yes |
Operating System | gentoo | linux | * | Yes |