Stack-based buffer overflow in the ServerNetworking::incoming_client_data function in servnet.cpp in Outgun 1.0.3 bot 2 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a data_file_request command with a long (1) type or (2) name string.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/outgunx-adv.txt - Exploit | |
References | () http://secunia.com/advisories/20098 - Exploit, Vendor Advisory | |
References | () http://securityreason.com/securityalert/898 - | |
References | () http://www.securityfocus.com/archive/1/433932/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17985 - Exploit | |
References | () http://www.vupen.com/english/advisories/2006/1796 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26509 - |
Information
Published : 2006-05-16 01:02
Updated : 2024-11-21 00:11
NVD link : CVE-2006-2399
Mitre link : CVE-2006-2399
CVE.ORG link : CVE-2006-2399
JSON object : View
Products Affected
outgun
- outgun
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer