Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-157: cadaver

Vulnerability Assessment Details

RHSA-2004-157: cadaver

Vulnerability Assessment Summary
Check for the version of the cadaver packages

Detailed Explanation for this Vulnerability Assessment

An updated cadaver package that fixes a vulnerability in neon exploitable
by a malicious DAV server is now available.

cadaver is a command-line WebDAV client that uses inbuilt code from neon,
an HTTP and WebDAV client library.

Versions of the neon client library up to and including 0.24.4 have been
found to contain a number of format string bugs. A possible hacker could create
a malicious WebDAV server in such a way as to permit arbitrary code
execution on the client should a user connect to it using cadaver. The
Common Vulnerabilities and Exposures project ( has assigned
the name CVE-2004-0179 to this issue.

Users of cadaver are advised to upgrade to this updated package, which
contains a patch correcting this issue.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Atari Vintage Rare BASIC Computing Language Left Cartridge
Atari Vintage Rare BASIC Computing Language Left Cartridge pictureNetusbee - cased - full USB + LAN
Netusbee - cased - full USB + LAN pictureKasumi Ninja Atari Jaguar Complete CIB
Kasumi Ninja Atari Jaguar Complete CIB pictureUltrasatan for ATARI ST/STE + 8GB SD CARD - ready to go
Ultrasatan for ATARI ST/STE + 8GB SD CARD - ready to go  picture


No Discussions have been posted on this vulnerability.