5
CVE-2004-0165
- EPSS 1.78%
- Published 15.03.2004 05:00:00
- Last modified 03.04.2025 01:03:51
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.
Data is provided by the National Vulnerability Database (NVD)
Apple ≫ macOS X Server Version10.1
Apple ≫ macOS X Server Version10.1.1
Apple ≫ macOS X Server Version10.1.2
Apple ≫ macOS X Server Version10.1.3
Apple ≫ macOS X Server Version10.1.4
Apple ≫ macOS X Server Version10.1.5
Apple ≫ macOS X Server Version10.2
Apple ≫ macOS X Server Version10.2.1
Apple ≫ macOS X Server Version10.2.2
Apple ≫ macOS X Server Version10.2.3
Apple ≫ macOS X Server Version10.2.4
Apple ≫ macOS X Server Version10.2.5
Apple ≫ macOS X Server Version10.2.6
Apple ≫ macOS X Server Version10.2.7
Apple ≫ macOS X Server Version10.2.8
Apple ≫ macOS X Server Version10.3
Apple ≫ macOS X Server Version10.3.1
Apple ≫ macOS X Server Version10.3.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.78% | 0.819 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|