Vulnerability Details : CVE-2004-1390
Multiple buffer overflows in the PPPoE daemon (PPPoEd) in QNX RTP 6.1 allow remote attackers to execute arbitrary code via a long argument to the (1) -F, (2) name, (3) en, (4) upscript, (5) downscript, (6) retries, (7) timeout, (8) scriptdetach, (9) noscript, (10) nodetach, (11) remote_mac, or (12) local_mac flags.
Vulnerability category: Execute code
Products affected by CVE-2004-1390
- cpe:2.3:a:qnx:rtp:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:qnx:rtos:4.25:*:*:*:*:*:*:*
- cpe:2.3:a:qnx:rtos:6.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:qnx:rtos:6.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:qnx:rtos:6.2.0a:*:*:*:*:*:*:*
- cpe:2.3:a:qnx:rtos:2.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-1390
2.16%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1390
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2004-1390
-
http://www.kb.cert.org/vuls/id/961686
Third Party Advisory;US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17280
-
http://www.securityfocus.com/bid/11104
Exploit
-
http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0155.html
Jump to