PLP Tools plpnsfd daemon format string attack
|plptools-plpnsfd-format-string (11193)||High Risk|
PLP Tools (Psion Link Protocol Tools) is vulnerable to a format string attack, caused by a vulnerability in the plpnfsd daemon logging function. A remote attacker could exploit this vulnerability by passing a directory name containing a malicious format string to the program to overwrite memory or execute arbitrary code on the system with elevated privileges, possibly root.
No remedy available as of August 1, 2014.
- BugTraq Mailing List, Wed Jan 29 2003 - 11:10:52 CST : Local root vuln in SuSE 8.0 plptools package.
- BugTraq Mailing List, Wed Jan 29 2003 - 11:17:28 CST: Re: Local root vuln in SuSE 8.0 plptools package.
- plptools Web page: The PLP Tools project homepage.
- BID-6715: PLP Tools plpnfsd Syslog Format String Vulnerability
- CVE-2003-0074: Format string vulnerability in mpmain.c for plpnfsd of the plptools package allows remote attackers to execute arbitrary code via the functions (1) debuglog, (2) errorlog, and (3) infolog.
- OSVDB ID: 13809: plptools plpnfsd Logging Format String Overflow
- Matt J. Gumbley PLP Tools 0.6
- SUSE SuSE Linux 7.2
- SUSE SuSE Linux 7.3
- SUSE SuSE Linux 8.0
- SUSE SuSE Linux 8.1
Jan 29, 2003
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this