CVE-2004-0398

N/A Unknown
Published: July 07, 2004 Modified: April 16, 2026
View on NVD

Description

Heap-based buffer overflow in the ne_rfc1036_parse date parsing function for the neon library (libneon) 0.24.5 and earlier, as used by cadaver before 0.22, allows remote WebDAV servers to execute arbitrary code on the client.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=108498433632333&w=2
Source: cve@mitre.org
Third Party Advisory
http://marc.info/?l=bugtraq&m=108500057108022&w=2
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/11638
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/11650
Source: cve@mitre.org
Third Party Advisory
http://secunia.com/advisories/11673
Source: cve@mitre.org
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200405-13.xml
Source: cve@mitre.org
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200405-15.xml
Source: cve@mitre.org
Third Party Advisory
http://www.ciac.org/ciac/bulletins/o-148.shtml
Source: cve@mitre.org
Broken Link
http://www.debian.org/security/2004/dsa-506
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2004/dsa-507
Source: cve@mitre.org
Third Party Advisory
http://www.osvdb.org/6302
Source: cve@mitre.org
Broken Link
http://www.redhat.com/support/errata/RHSA-2004-191.html
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/bid/10385
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://bugzilla.fedora.us/show_bug.cgi?id=1552
Source: cve@mitre.org
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/16192
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0982.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000841
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://marc.info/?l=bugtraq&m=108498433632333&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=108500057108022&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/11638
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/11650
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/11673
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200405-13.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://security.gentoo.org/glsa/glsa-200405-15.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.ciac.org/ciac/bulletins/o-148.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2004/dsa-506
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2004/dsa-507
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2004:049
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.osvdb.org/6302
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2004-191.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/10385
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://bugzilla.fedora.us/show_bug.cgi?id=1552
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/16192
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

36 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
4.8%
90th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

debian webdav