CVE-2007-3917

The multiplayer engine in Wesnoth 1.2.x before 1.2.7 and 1.3.x before 1.3.9 allows remote servers to cause a denial of service (crash) via a long message with multibyte characters that can produce an invalid UTF-8 string after it is truncated, which triggers an uncaught exception, involving the truncate_message function in server/server.cpp. NOTE: this issue affects both clients and servers.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wesnoth:wesnoth:1.2:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.3.7:*:*:*:*:*:*:*
cpe:2.3:a:wesnoth:wesnoth:1.3.8:*:*:*:*:*:*:*

History

21 Nov 2024, 00:34

Type Values Removed Values Added
References () http://osvdb.org/41711 - () http://osvdb.org/41711 -
References () http://secunia.com/advisories/27137 - Vendor Advisory () http://secunia.com/advisories/27137 - Vendor Advisory
References () http://secunia.com/advisories/27218 - Vendor Advisory () http://secunia.com/advisories/27218 - Vendor Advisory
References () http://secunia.com/advisories/27241 - Vendor Advisory () http://secunia.com/advisories/27241 - Vendor Advisory
References () http://svn.gna.org/viewcvs/wesnoth/tags/1.2.7/changelog?rev=20982&view=download - () http://svn.gna.org/viewcvs/wesnoth/tags/1.2.7/changelog?rev=20982&view=download -
References () http://www.debian.org/security/2007/dsa-1386 - () http://www.debian.org/security/2007/dsa-1386 -
References () http://www.securityfocus.com/bid/25995 - () http://www.securityfocus.com/bid/25995 -
References () http://www.vupen.com/english/advisories/2007/3449 - Vendor Advisory () http://www.vupen.com/english/advisories/2007/3449 - Vendor Advisory
References () http://www.wesnoth.org/forum/viewtopic.php?p=256618 - () http://www.wesnoth.org/forum/viewtopic.php?p=256618 -
References () http://www.wesnoth.org/forum/viewtopic.php?t=18188 - () http://www.wesnoth.org/forum/viewtopic.php?t=18188 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=324841 - () https://bugzilla.redhat.com/show_bug.cgi?id=324841 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/37047 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/37047 -
References () https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00194.html - () https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00194.html -

Information

Published : 2007-10-11 10:17

Updated : 2024-11-21 00:34


NVD link : CVE-2007-3917

Mitre link : CVE-2007-3917

CVE.ORG link : CVE-2007-3917


JSON object : View

Products Affected

wesnoth

  • wesnoth
CWE
CWE-134

Use of Externally-Controlled Format String