Stack-based buffer overflow in Gadu-Gadu 7.20 allows remote attackers to cause a denial of service (crash) via an image filename between exactly 192 to 200 characters, which does not account for the "imgcache\" string that is added to the end of the buffer.
References
Configurations
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0658.html - Vendor Advisory | |
References | () http://marc.info/?l=bugtraq&m=113261573023912&w=2 - | |
References | () http://secunia.com/advisories/17597/ - Patch, Vendor Advisory | |
References | () http://www.osvdb.org/21016 - | |
References | () http://www.securityfocus.com/bid/15520/ - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/23149 - |
Information
Published : 2005-11-29 21:03
Updated : 2024-11-21 00:02
NVD link : CVE-2005-3891
Mitre link : CVE-2005-3891
CVE.ORG link : CVE-2005-3891
JSON object : View
Products Affected
gadu-gadu
- gadu-gadu_instant_messenger
CWE