Description
Format string vulnerability in the msg function for rlpr daemon (rlprd) 2.0.4 allows remote attackers to execute arbitrary code via format string specifiers in a buffer that can not be resolved, which is provided to the syslog function.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by jaguar · pythonremotelinux
https://www.exploit-db.com/exploits/307
exploitdb
WORKING POC
VERIFIED
https://www.exploit-db.com/exploits/24223
References (4)
Core 4
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=108810992313652&w=2
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/10578
Patch, Vendor Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2004/dsa-524
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/16453
Scores
EPSS
0.1449
EPSS Percentile
94.5%
Details
Status
published
Products (5)
rlpr/rlpr
2.0
rlpr/rlpr
2.0.1
rlpr/rlpr
2.0.2
rlpr/rlpr
2.0.3
rlpr/rlpr
2.0.4
Published
Dec 06, 2004
Tracked Since
Feb 18, 2026