Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pcc3-c79c-gx8x

Опубликовано: 23 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).

Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).

EPSS

Процентиль: 90%
0.05888
Низкий

Связанные уязвимости

redhat
около 14 лет назад

Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).

CVSS3: 9.8
nvd
почти 6 лет назад

Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).

CVSS3: 9.8
debian
почти 6 лет назад

Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xch ...

EPSS

Процентиль: 90%
0.05888
Низкий