Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mq5j-fjgv-p7px

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Stack-based buffer overflow in the ServerNetworking::incoming_client_data function in servnet.cpp in Outgun 1.0.3 bot 2 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a data_file_request command with a long (1) type or (2) name string.

Stack-based buffer overflow in the ServerNetworking::incoming_client_data function in servnet.cpp in Outgun 1.0.3 bot 2 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a data_file_request command with a long (1) type or (2) name string.

EPSS

Процентиль: 94%
0.13984
Средний

Дефекты

CWE-119

Связанные уязвимости

nvd
больше 19 лет назад

Stack-based buffer overflow in the ServerNetworking::incoming_client_data function in servnet.cpp in Outgun 1.0.3 bot 2 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a data_file_request command with a long (1) type or (2) name string.

EPSS

Процентиль: 94%
0.13984
Средний

Дефекты

CWE-119