Format string vulnerability in the AbstractCommand::onAbort function in src/AbstractCommand.cc in aria2 before 1.6.2, when logging is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via format string specifiers in a download URI. NOTE: some of these details are obtained from third party information.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Format string vulnerability in the AbstractCommand::onAbort function in src/AbstractCommand.cc in aria2 before 1.6.2, when logging is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via format string specifiers in a download URI. NOTE: some of these details are obtained from third party information.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://fedorahosted.org/rel-eng/ticket/2495 | x_refsource_CONFIRM |
http://aria2.svn.sourceforge.net/viewvc/aria2/trunk/src/AbstractCommand.cc?r1=1539&r2=1572 | x_refsource_CONFIRM |
http://www.vupen.com/english/advisories/2009/2960 | vdb-entry x_refsource_VUPEN |
http://marc.info/?l=oss-security&m=125568632528906&w=2 | mailing-list x_refsource_MLIST |
https://bugzilla.redhat.com/show_bug.cgi?id=529342 | x_refsource_CONFIRM |
http://secunia.com/advisories/31732 | third-party-advisory x_refsource_SECUNIA |
http://osvdb.org/59087 | vdb-entry x_refsource_OSVDB |
http://marc.info/?l=oss-security&m=125572053420493&w=2 | mailing-list x_refsource_MLIST |
http://aria2.svn.sourceforge.net/viewvc/aria2/trunk/NEWS?revision=1586 | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://fedorahosted.org/rel-eng/ticket/2495 | x_refsource_CONFIRM x_transferred |
http://aria2.svn.sourceforge.net/viewvc/aria2/trunk/src/AbstractCommand.cc?r1=1539&r2=1572 | x_refsource_CONFIRM x_transferred |
http://www.vupen.com/english/advisories/2009/2960 | vdb-entry x_refsource_VUPEN x_transferred |
http://marc.info/?l=oss-security&m=125568632528906&w=2 | mailing-list x_refsource_MLIST x_transferred |
https://bugzilla.redhat.com/show_bug.cgi?id=529342 | x_refsource_CONFIRM x_transferred |
http://secunia.com/advisories/31732 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://osvdb.org/59087 | vdb-entry x_refsource_OSVDB x_transferred |
http://marc.info/?l=oss-security&m=125572053420493&w=2 | mailing-list x_refsource_MLIST x_transferred |
http://aria2.svn.sourceforge.net/viewvc/aria2/trunk/NEWS?revision=1586 | x_refsource_CONFIRM x_transferred |
Format string vulnerability in the AbstractCommand::onAbort function in src/AbstractCommand.cc in aria2 before 1.6.2, when logging is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via format string specifiers in a download URI. NOTE: some of these details are obtained from third party information.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 7.6 | HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
Hyperlink | Source | Resource |
---|---|---|
http://aria2.svn.sourceforge.net/viewvc/aria2/trunk/NEWS?revision=1586 | secalert@redhat.com | N/A |
http://aria2.svn.sourceforge.net/viewvc/aria2/trunk/src/AbstractCommand.cc?r1=1539&r2=1572 | secalert@redhat.com | Patch |
http://marc.info/?l=oss-security&m=125568632528906&w=2 | secalert@redhat.com | Patch |
http://marc.info/?l=oss-security&m=125572053420493&w=2 | secalert@redhat.com | N/A |
http://osvdb.org/59087 | secalert@redhat.com | N/A |
http://secunia.com/advisories/31732 | secalert@redhat.com | Vendor Advisory |
http://www.vupen.com/english/advisories/2009/2960 | secalert@redhat.com | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=529342 | secalert@redhat.com | Patch |
https://fedorahosted.org/rel-eng/ticket/2495 | secalert@redhat.com | N/A |