Описание
Stack-based buffer overflow in the ServerNetworking::incoming_client_data function in servnet.cpp in Outgun 1.0.3 bot 2 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a data_file_request command with a long (1) type or (2) name string.
Stack-based buffer overflow in the ServerNetworking::incoming_client_data function in servnet.cpp in Outgun 1.0.3 bot 2 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a data_file_request command with a long (1) type or (2) name string.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-2399
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26509
- http://aluigi.altervista.org/adv/outgunx-adv.txt
- http://secunia.com/advisories/20098
- http://securityreason.com/securityalert/898
- http://www.securityfocus.com/archive/1/433932/100/0/threaded
- http://www.securityfocus.com/bid/17985
- http://www.vupen.com/english/advisories/2006/1796
Связанные уязвимости
Stack-based buffer overflow in the ServerNetworking::incoming_client_data function in servnet.cpp in Outgun 1.0.3 bot 2 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a data_file_request command with a long (1) type or (2) name string.