CVE-2004-0393

rlpr daemon 2.0.4 - RCE

Title source: llm
STIX 2.1

Description

Format string vulnerability in the msg function for rlpr daemon (rlprd) 2.0.4 allows remote attackers to execute arbitrary code via format string specifiers in a buffer that can not be resolved, which is provided to the syslog function.

Exploits (2)

exploitdb WORKING POC VERIFIED
by jaguar · pythonremotelinux
https://www.exploit-db.com/exploits/307
exploitdb WORKING POC VERIFIED
by [email protected] · pythonremotelinux
https://www.exploit-db.com/exploits/24223

References (4)

Core 4
Core References
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=108810992313652&w=2
Exploit, Patch, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/10578
Patch, Vendor Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2004/dsa-524
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/16453

Scores

EPSS 0.1449
EPSS Percentile 94.5%

Details

Status published
Products (5)
rlpr/rlpr 2.0
rlpr/rlpr 2.0.1
rlpr/rlpr 2.0.2
rlpr/rlpr 2.0.3
rlpr/rlpr 2.0.4
Published Dec 06, 2004
Tracked Since Feb 18, 2026