Multiple buffer overflows in Battlefront Dropteam 1.3.3 and earlier allow remote attackers to execute arbitrary code via (1) a crafted "0x5c" packet or (2) many 32-bit numbers in a "0x18" packet, or cause a denial of service (crash) via (3) a large "0x4b" packet.
References
Configurations
History
21 Nov 2024, 00:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/dropteamz-adv.txt - Exploit | |
References | () http://secunia.com/advisories/27107 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/3202 - | |
References | () http://www.securityfocus.com/archive/1/481616/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/25943 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36975 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36976 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36977 - |
Information
Published : 2007-10-08 21:17
Updated : 2024-11-21 00:37
NVD link : CVE-2007-5263
Mitre link : CVE-2007-5263
CVE.ORG link : CVE-2007-5263
JSON object : View
Products Affected
battlefront
- dropteam
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer