Cfengine CAUTH Command Remote Format String

Critical Nessus Plugin ID 14316


The remote host is affected by a remote command execution vulnerability.


Cfengine is running on this remote host.

Cfengine contains a component, cfd, which serves as a remote-configuration client to cfengine. This version of cfd contains several flaws in the way that it calls syslog(). As a result, trusted hosts and valid users (if access controls are not in place) can cause the vulnerable host to log malicious data which, when logged, can either crash the server or execute arbitrary code on the stack. In the latter case, the code would be executed as the 'root' user.


Upgrade to 1.6.0a11 or newer

See Also

Plugin Details

Severity: Critical

ID: 14316

File Name: cfengine_format_string_vuln.nasl

Version: $Revision: 1.15 $

Type: local

Published: 2004/08/20

Modified: 2011/11/28

Dependencies: 14315

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

Vulnerability Publication Date: 2000/10/01

Reference Information

CVE: CVE-2000-0947

BID: 1757

OSVDB: 1590