Vulnerability Details : CVE-2004-0368
Double free vulnerability in dtlogin in CDE on Solaris, HP-UX, and other operating systems allows remote attackers to execute arbitrary code via a crafted XDMCP packet.
Vulnerability category: OverflowMemory CorruptionExecute code
Exploit prediction scoring system (EPSS) score for CVE-2004-0368
Probability of exploitation activity in the next 30 days: 90.89%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-0368
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2004-0368
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2004-0368
-
http://www.securityfocus.com/bid/9958
-
http://www.kb.cert.org/vuls/id/179804
Third Party Advisory;US Government Resource
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57539-1&searchclause=security
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/15581
-
http://www.ciac.org/ciac/bulletins/o-129.shtml
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101478-1
-
http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0064.html
Vendor Advisory
-
http://www.auscert.org.au/render.html?it=4103&cid=3734
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1436
-
http://www.immunitysec.com/downloads/dtlogin.sxw.pdf
- ftp://patches.sgi.com/support/free/security/advisories/20040801-01-P
-
http://lists.immunitysec.com/pipermail/dailydave/2004-March/000402.html
Vendor Advisory
Products affected by CVE-2004-0368
- cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*
- cpe:2.3:a:xi_graphics:dextop:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:xi_graphics:dextop:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:open_group:cde_common_desktop_environment:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:open_group:cde_common_desktop_environment:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:open_group:cde_common_desktop_environment:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:open_group:cde_common_desktop_environment:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:open_group:cde_common_desktop_environment:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:open_group:cde_common_desktop_environment:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:open_group:cde_common_desktop_environment:2.1.20:*:*:*:*:*:*:*