Multiple stack-based buffer overflows in the HanGamePluginCn18.HanGamePluginCn18.1 ActiveX control in HanGamePluginCn18.dll in Ourgame GLWorld 2.6.1.29 (aka Lianzong Game Platform) allow remote attackers to execute arbitrary code via long arguments to the (1) hgs_startGame and (2) hgs_startNotify methods, as exploited in the wild as of February 2008. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/28809 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/27626 - | |
References | () http://www.symantec.com/enterprise/security_response/weblog/2008/02/zeroday_exploit_for_lianzong_g.html - | |
References | () http://www.vupen.com/english/advisories/2008/0427 - | |
References | () https://www.exploit-db.com/exploits/5153 - |
Information
Published : 2008-02-07 21:00
Updated : 2024-11-21 00:42
NVD link : CVE-2008-0647
Mitre link : CVE-2008-0647
CVE.ORG link : CVE-2008-0647
JSON object : View
Products Affected
ourgame.com
- hangameplugincn18_activex_control
- glworld
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer