fkie_cve-2004-0226
Vulnerability from fkie_nvd
Published
2004-08-18 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| midnight_commander | midnight_commander | 4.5.40 | |
| midnight_commander | midnight_commander | 4.5.41 | |
| midnight_commander | midnight_commander | 4.5.42 | |
| midnight_commander | midnight_commander | 4.5.43 | |
| midnight_commander | midnight_commander | 4.5.44 | |
| midnight_commander | midnight_commander | 4.5.45 | |
| midnight_commander | midnight_commander | 4.5.46 | |
| midnight_commander | midnight_commander | 4.5.47 | |
| midnight_commander | midnight_commander | 4.5.48 | |
| midnight_commander | midnight_commander | 4.5.49 | |
| midnight_commander | midnight_commander | 4.5.50 | |
| midnight_commander | midnight_commander | 4.5.51 | |
| midnight_commander | midnight_commander | 4.5.52 | |
| midnight_commander | midnight_commander | 4.5.55 | |
| midnight_commander | midnight_commander | 4.6 | |
| sgi | propack | 2.3 | |
| sgi | propack | 2.4 | |
| gentoo | linux | 0.5 | |
| gentoo | linux | 0.7 | |
| gentoo | linux | 1.1a | |
| gentoo | linux | 1.2 | |
| gentoo | linux | 1.4 | |
| gentoo | linux | 1.4 | |
| gentoo | linux | 1.4 | |
| gentoo | linux | 1.4 | |
| slackware | slackware_linux | * | |
| slackware | slackware_linux | 9.0 | |
| slackware | slackware_linux | 9.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.40:*:*:*:*:*:*:*",
"matchCriteriaId": "EB4028BE-4173-4175-B9EF-A85A47476A60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FC64619A-D8C3-4613-9A51-849DC65DC959",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0A4BBBE0-E96D-4BCB-BF5B-673888C00AC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.43:*:*:*:*:*:*:*",
"matchCriteriaId": "D410B4E1-DA7A-4F62-A0F9-E8C5A147BD45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.44:*:*:*:*:*:*:*",
"matchCriteriaId": "949399A7-6E77-4F12-86EE-7B6FBAA16D4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.45:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE8085F-84F3-4305-A52B-FEFF05E9FD17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.46:*:*:*:*:*:*:*",
"matchCriteriaId": "D5DA21F1-8700-437C-8D64-70D97A508598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.47:*:*:*:*:*:*:*",
"matchCriteriaId": "B03CA3A4-86E2-4E10-8F56-51B814F51540",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.48:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AA5CCF-F160-4092-A7E7-29459E2528F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.49:*:*:*:*:*:*:*",
"matchCriteriaId": "F2B90B64-72A2-46D3-A6CC-07052FC70740",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.50:*:*:*:*:*:*:*",
"matchCriteriaId": "1E7739C2-C590-479E-8A0B-2EC95E836E3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.51:*:*:*:*:*:*:*",
"matchCriteriaId": "25C1FE96-BC31-48D3-BB64-F132E17B8244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.52:*:*:*:*:*:*:*",
"matchCriteriaId": "0BFFA28E-B2EA-4F1A-8A05-7F2B05572B99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.5.55:*:*:*:*:*:*:*",
"matchCriteriaId": "E5969E22-C2B8-4440-92D0-EF17ECFECFCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:midnight_commander:midnight_commander:4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "98D27DF4-BCF6-4AB8-9117-80E2D1072C6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "26430687-409B-448F-934B-06AB937DDF63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0702A32E-E577-403C-B4D9-15037D7100A5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "980553F2-8662-47CF-95F0-645141746AEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "40EBF1CD-B392-4262-8F06-2C784ADAF0F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9C00F84A-FCD4-4935-B7DE-ECBA6AE9B074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "960DC6C2-B285-41D4-96F7-ED97F8BD5482",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "65ED9D8C-604D-4B0B-A192-C0DA4D2E9AEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D1FD0EB4-E744-4465-AFEE-A3C807C9C993",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*",
"matchCriteriaId": "57772E3B-893C-408A-AA3B-78C972ED4D5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:slackware:slackware_linux:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F432C6C2-8676-4DD5-B9E6-71F6C164EF9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "300A6A65-05FD-401C-80F6-B5F5B1F056E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3D53C9-3806-45E6-8AE9-7D41280EF64C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple buffer overflows in Midnight Commander (mc) before 4.6.0 may allow attackers to cause a denial of service or execute arbitrary code."
},
{
"lang": "es",
"value": "M\u00faltiples desbordamientos de b\u00fafer en Midnight Commander (mc) anteriores a 4.6.0 pueden permitir a atacantes causar una denegaci\u00f3n de servicio o ejecutar c\u00f3digo arbitrario."
}
],
"id": "CVE-2004-0226",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-08-18T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200405-21.xml"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2004/dsa-497"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:039"
},
{
"source": "cve@mitre.org",
"url": "http://www.novell.com/linux/security/advisories/2004_12_mc.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-172.html"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16016"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200405-21.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2004/dsa-497"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:039"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2004_12_mc.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2004-172.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16016"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…