CVE-2004-1006
Summary
| CVE | CVE-2004-1006 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-03-01 05:00:00 UTC |
| Updated | 2017-07-11 01:30:00 UTC |
| Description | Format string vulnerability in the log functions in dhcpd for dhcp 2.x allows remote DNS servers to execute arbitrary code via certain DNS messages, a different vulnerability than CVE-2002-0702. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Isc | Dhcpd | 2.0.pl5 | All | All | All |
| Application | Isc | Dhcpd | 3.0 | All | All | All |
| Application | Isc | Dhcpd | 3.0 | rc12 | All | All |
| Application | Isc | Dhcpd | 3.0 | rc4 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc1 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc10 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc11 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc12 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc13 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc14 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc2 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc3 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc4 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc5 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc6 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc7 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc8 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc9 | All | All |
| Application | Isc | Dhcpd | 3.0_b2pl23 | All | All | All |
| Application | Isc | Dhcpd | 3.0_b2pl9 | All | All | All |
| Application | Isc | Dhcpd | 3.0_pl1 | All | All | All |
| Application | Isc | Dhcpd | 3.0_pl2 | All | All | All |
| Application | Isc | Dhcpd | 2.0.pl5 | All | All | All |
| Application | Isc | Dhcpd | 3.0 | All | All | All |
| Application | Isc | Dhcpd | 3.0 | rc12 | All | All |
| Application | Isc | Dhcpd | 3.0 | rc4 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc1 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc10 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc11 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc12 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc13 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc14 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc2 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc3 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc4 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc5 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc6 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc7 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc8 | All | All |
| Application | Isc | Dhcpd | 3.0.1 | rc9 | All | All |
| Application | Isc | Dhcpd | 3.0_b2pl23 | All | All | All |
| Application | Isc | Dhcpd | 3.0_b2pl9 | All | All | All |
| Application | Isc | Dhcpd | 3.0_pl1 | All | All | All |
| Application | Isc | Dhcpd | 3.0_pl2 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Neohapsis Archives - Bugtraq - #0037 - Re: debian dhcpd, old format string bug | BUGTRAQ | archives.neohapsis.com | |
| ISC DHCPD Remote Format String Vulnerability | BID | www.securityfocus.com | Patch, Vendor Advisory |
| Neohapsis Archives - Bugtraq - #0287 - debian dhcpd, old format string bug | BUGTRAQ | archives.neohapsis.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Debian -- Security Information -- DSA-584-1 dhcp | DEBIAN | www.debian.org | Patch, Vendor Advisory |
| 'Re: debian dhcpd, old format string bug' - MARC | BUGTRAQ | marc.info | |
| US-CERT Vulnerability Note VU#448384 | CERT-VN | www.kb.cert.org | US Government Resource |
| rhn.redhat.com | Red Hat Support | REDHAT | www.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.