Описание
Stack-based buffer overflow in main.c in DConnect Daemon 0.7.0 and earlier allows remote attackers to execute arbitrary code via a large nickname, which is not properly handled by the listen_thread_udp function.
Stack-based buffer overflow in main.c in DConnect Daemon 0.7.0 and earlier allows remote attackers to execute arbitrary code via a large nickname, which is not properly handled by the listen_thread_udp function.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-4125
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28276
- http://secunia.com/advisories/21384
- http://securityreason.com/securityalert/1377
- http://securitytracker.com/id?1016641
- http://www.dc.ds.pg.gda.pl
- http://www.dc.ds.pg.gda.pl/?page=doc&doc=changelog
- http://www.securityfocus.com/archive/1/442440/100/0/threaded
- http://www.securityfocus.com/bid/19369
- http://www.vupen.com/english/advisories/2006/3181
EPSS
Процентиль: 96%
0.26993
Средний
CVE ID
Связанные уязвимости
nvd
больше 19 лет назад
Stack-based buffer overflow in main.c in DConnect Daemon 0.7.0 and earlier allows remote attackers to execute arbitrary code via a large nickname, which is not properly handled by the listen_thread_udp function.
EPSS
Процентиль: 96%
0.26993
Средний