CVE-2008-2828

Stack-based buffer overflow in tmsnc allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an MSN packet with a UBX command containing a large UBX payload length field.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tmsnc:tmsnc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:47

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487222 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487222 -
References () http://secunia.com/advisories/34235 - Vendor Advisory () http://secunia.com/advisories/34235 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200903-26.xml - () http://security.gentoo.org/glsa/glsa-200903-26.xml -
References () http://www.securityfocus.com/bid/29850 - () http://www.securityfocus.com/bid/29850 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/43297 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/43297 -

Information

Published : 2008-06-23 19:41

Updated : 2024-11-21 00:47


NVD link : CVE-2008-2828

Mitre link : CVE-2008-2828

CVE.ORG link : CVE-2008-2828


JSON object : View

Products Affected

tmsnc

  • tmsnc
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer