{"api_version":"1","generated_at":"2026-04-22T23:21:41+00:00","cve":"CVE-2004-0354","urls":{"html":"https://cve.report/CVE-2004-0354","api":"https://cve.report/api/cve/CVE-2004-0354.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2004-0354","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2004-0354"},"summary":{"title":"CVE-2004-0354","description":"Multiple format string vulnerabilities in GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to execute arbitrary code via format string specifiers in strings passed to (1) the info function in log.c, (2) the anubis_error function in errs.c, or (3) the ssl_error function in ssl.c.","state":"PUBLISHED","assigner":"mitre","published_at":"2004-11-23 05:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15346","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15346","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/9772","name":"http://www.securityfocus.com/bid/9772","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"],"title":"GNU Anubis Multiple Remote Buffer Overflow and Format String Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://marc.info/?l=bugtraq&m=107843915424588&w=2","name":"http://marc.info/?l=bugtraq&m=107843915424588&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'GNU Anubis buffer overflows and format string bugs' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://mail.gnu.org/archive/html/bug-anubis/2004-02/msg00000.html","name":"http://mail.gnu.org/archive/html/bug-anubis/2004-02/msg00000.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[bug-anubis] Important security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2004-0354","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0354","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2004","cve_id":"354","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"anubis","cpe6":"3.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"354","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"anubis","cpe6":"3.6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"354","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"anubis","cpe6":"3.6.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"354","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"anubis","cpe6":"3.9.92","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"354","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"anubis","cpe6":"3.9.93","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T00:17:14.240Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"anubis-format-string(15346)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15346"},{"name":"[bug-anubis] 20040228 Important security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"http://mail.gnu.org/archive/html/bug-anubis/2004-02/msg00000.html"},{"name":"20040304 GNU Anubis buffer overflows and format string bugs","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=107843915424588&w=2"},{"name":"9772","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/9772"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2004-03-04T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple format string vulnerabilities in GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to execute arbitrary code via format string specifiers in strings passed to (1) the info function in log.c, (2) the anubis_error function in errs.c, or (3) the ssl_error function in ssl.c."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-07-10T14:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"anubis-format-string(15346)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15346"},{"name":"[bug-anubis] 20040228 Important security update","tags":["mailing-list","x_refsource_MLIST"],"url":"http://mail.gnu.org/archive/html/bug-anubis/2004-02/msg00000.html"},{"name":"20040304 GNU Anubis buffer overflows and format string bugs","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=107843915424588&w=2"},{"name":"9772","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/9772"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2004-0354","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple format string vulnerabilities in GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to execute arbitrary code via format string specifiers in strings passed to (1) the info function in log.c, (2) the anubis_error function in errs.c, or (3) the ssl_error function in ssl.c."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"anubis-format-string(15346)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/15346"},{"name":"[bug-anubis] 20040228 Important security update","refsource":"MLIST","url":"http://mail.gnu.org/archive/html/bug-anubis/2004-02/msg00000.html"},{"name":"20040304 GNU Anubis buffer overflows and format string bugs","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=107843915424588&w=2"},{"name":"9772","refsource":"BID","url":"http://www.securityfocus.com/bid/9772"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2004-0354","datePublished":"2004-03-18T05:00:00.000Z","dateReserved":"2004-03-17T00:00:00.000Z","dateUpdated":"2024-08-08T00:17:14.240Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2004-11-23 05:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:anubis:3.6.0:*:*:*:*:*:*:*","matchCriteriaId":"7230ED9A-70BF-42E7-A78A-19C5F93F8370"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:anubis:3.6.1:*:*:*:*:*:*:*","matchCriteriaId":"0B10657B-056D-4E78-98B5-0FB71F6FCE97"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:anubis:3.6.2:*:*:*:*:*:*:*","matchCriteriaId":"6BDADFEE-8F14-4CE1-9BD6-FB3BA338D35F"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:anubis:3.9.92:*:*:*:*:*:*:*","matchCriteriaId":"F3B0AC2E-2177-4783-80E1-4C9A6E364D65"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:anubis:3.9.93:*:*:*:*:*:*:*","matchCriteriaId":"B2EB87D6-C702-40BC-ADA4-EA1D6C418311"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2004","CveId":"354","Ordinal":"1","Title":"CVE-2004-0354","CVE":"CVE-2004-0354","Year":"2004"},"notes":[{"CveYear":"2004","CveId":"354","Ordinal":"1","NoteData":"Multiple format string vulnerabilities in GNU Anubis 3.6.0 through 3.6.2, 3.9.92 and 3.9.93 allow remote attackers to execute arbitrary code via format string specifiers in strings passed to (1) the info function in log.c, (2) the anubis_error function in errs.c, or (3) the ssl_error function in ssl.c.","Type":"Description","Title":"CVE-2004-0354"},{"CveYear":"2004","CveId":"354","Ordinal":"2","NoteData":"2004-03-18","Type":"Other","Title":"Published"},{"CveYear":"2004","CveId":"354","Ordinal":"3","NoteData":"2017-07-10","Type":"Other","Title":"Modified"}]}}}