Vulnerability Name:

CVE-2004-0179 (CCN-15863)

Assigned:2004-04-14
Published:2004-04-14
Updated:2020-10-13
Summary:Multiple format string vulnerabilities in (1) neon 0.24.4 and earlier, and other products that use neon including (2) Cadaver, (3) Subversion, and (4) OpenOffice, allow remote malicious WebDAV servers to execute arbitrary code.
CVSS v3 Severity:5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-134
Vulnerability Consequences:Gain Access
References:Source: SGI
Type: Broken Link
20040404-01-U

Source: CCN
Type: BugTraq Mailing List, Fri Apr 16 2004 - 13:29:16 CDT
void.at - neon format string bugs

Source: MITRE
Type: CNA
CVE-2004-0179

Source: SUSE
Type: Broken Link
SuSE-SA:2004:009

Source: SUSE
Type: Broken Link
SuSE-SA:2004:008

Source: BUGTRAQ
Type: Issue Tracking, Third Party Advisory
20040416 [OpenPKG-SA-2004.016] OpenPKG Security Advisory (neon)

Source: BUGTRAQ
Type: Issue Tracking, Third Party Advisory
20040416 void.at - neon format string bugs

Source: CCN
Type: RHSA-2004-157
cadaver security update

Source: CCN
Type: RHSA-2004-158
Updated cadaver package fixes security vulnerability in neon

Source: CCN
Type: RHSA-2004-159
Updated Subversion packages fix security vulnerability in neon

Source: CCN
Type: RHSA-2004-160
openoffice.org security update

Source: CCN
Type: RHSA-2004-163
Updated OpenOffice packages fix security vulnerability in neon

Source: CCN
Type: SA11363
Neon Client Library Format String Vulnerabilities

Source: SECUNIA
Type: Third Party Advisory
11363

Source: GENTOO
Type: Third Party Advisory
GLSA-200405-01

Source: GENTOO
Type: Third Party Advisory
GLSA-200405-04

Source: CCN
Type: CIAC Information Bulletin O-122
Red Hat Updated OpenOffice Packages Fix Security Vulnerability in Neon

Source: DEBIAN
Type: Third Party Advisory
DSA-487

Source: DEBIAN
Type: DSA-487
neon -- format string

Source: CCN
Type: GLSA-200404-14
Multiple format string vulnerabilities in cadaver

Source: CCN
Type: GLSA-200405-01
Multiple format string vulnerabilities in neon 0.24.4 and earlier

Source: CCN
Type: GLSA-200405-04
OpenOffice.org vulnerability when using DAV servers

Source: CCN
Type: GLSA-200406-03
sitecopy: Multiple vulnerabilities in included libneon

Source: CCN
Type: GLSA 200404-14
Multiple format string vulnerabilities in cadaver

Source: CCN
Type: GLSA 200405-04
OpenOffice.org vulnerability when using DAV servers

Source: MANDRAKE
Type: Third Party Advisory
MDKSA-2004:032

Source: CCN
Type: OpenPKG-SA-2004.016
neon

Source: OSVDB
Type: Broken Link
5365

Source: CCN
Type: OSVDB ID: 5365
Neon Client Format String

Source: REDHAT
Type: Third Party Advisory
RHSA-2004:157

Source: REDHAT
Type: Third Party Advisory
RHSA-2004:158

Source: REDHAT
Type: Third Party Advisory
RHSA-2004:159

Source: REDHAT
Type: Third Party Advisory
RHSA-2004:160

Source: BID
Type: Third Party Advisory, VDB Entry
10136

Source: CCN
Type: BID-10136
Neon WebDAV Client Library Format String Vulnerabilities

Source: CCN
Type: neon Web page
neon HTTP and WebDAV client library

Source: FEDORA
Type: Broken Link
FEDORA-2004-1552

Source: XF
Type: UNKNOWN
neon-format-string(15863)

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:1065

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:10913

Source: SUSE
Type: SUSE-SA:2004:008
cvs: remote code execution

Source: SUSE
Type: SUSE-SA:2004:009
Linux Kernel: local privilege escalation / information leakage

Source: SUSE
Type: SUSE-SA:2004:015
cvs: remote command execution

Source: SUSE
Type: SUSE-SA:2004:016
squid: remote system compromise

Source: SUSE
Type: SUSE-SA:2004:017
Linux Kernel: local denial-of-service attack

Source: SUSE
Type: SUSE-SA:2004:018
subversion: remote system compromise

Source: SUSE
Type: SUSE-SA:2004:019
dhcp-server: remote system compromise

Source: SUSE
Type: SUSE-SA:2004:020
kernel: local privilege escalation

Source: SUSE
Type: SUSE-SA:2004:021
php4 / mod_php4: remote code execution

Source: SUSE
Type: SUSE-SA:2004:022
samba: remote root compromise

Vulnerable Configuration:Configuration 1:
  • cpe:/a:webdav:neon:*:*:*:*:*:*:*:* (Version >= 0.19.0 and < 0.24.5)
  • AND
  • cpe:/a:apache:openoffice:*:*:*:*:*:*:*:*
  • OR cpe:/a:apache:subversion:*:*:*:*:*:*:*:*
  • OR cpe:/a:webdav:cadaver:*:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20040179
    V
    CVE-2004-0179
    2015-11-16
    oval:org.mitre.oval:def:10913
    V
    Multiple format string vulnerabilities in (1) neon 0.24.4 and earlier, and other products that use neon including (2) Cadaver, (3) Subversion, and (4) OpenOffice, allow remote malicious WebDAV servers to execute arbitrary code.
    2013-04-29
    oval:org.mitre.oval:def:1065
    V
    Multiple Format String Vulnerabilities in neon and Dependent Products
    2007-04-25
    oval:org.debian:def:487
    V
    format string
    2004-04-16
    oval:com.redhat.rhsa:def:20040160
    P
    RHSA-2004:160: openoffice.org security update (Important)
    2004-04-14
    BACK
    webdav neon *
    apache openoffice *
    apache subversion *
    webdav cadaver *
    debian debian linux 3.0