Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-2828

Опубликовано: 23 июн. 2008
Источник: debian
EPSS Низкий

Описание

Stack-based buffer overflow in tmsnc allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an MSN packet with a UBX command containing a large UBX payload length field.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tmsncfixed0.3.2-1.1package

EPSS

Процентиль: 86%
0.03122
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

Stack-based buffer overflow in tmsnc allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an MSN packet with a UBX command containing a large UBX payload length field.

nvd
больше 17 лет назад

Stack-based buffer overflow in tmsnc allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an MSN packet with a UBX command containing a large UBX payload length field.

github
больше 3 лет назад

Stack-based buffer overflow in tmsnc allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an MSN packet with a UBX command containing a large UBX payload length field.

EPSS

Процентиль: 86%
0.03122
Низкий