Описание
Stack-based buffer overflow in main.c in DConnect Daemon 0.7.0 and earlier allows remote attackers to execute arbitrary code via a large nickname, which is not properly handled by the listen_thread_udp function.
Ссылки
- ExploitVendor Advisory
- Exploit
- Patch
- ExploitPatch
- ExploitVendor Advisory
- Exploit
- Patch
- ExploitPatch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:dconnect:dconnect_daemon:0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:dconnect:dconnect_daemon:0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:dconnect:dconnect_daemon:0.7.0:*:*:*:*:*:*:*
EPSS
Процентиль: 96%
0.26993
Средний
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Stack-based buffer overflow in main.c in DConnect Daemon 0.7.0 and earlier allows remote attackers to execute arbitrary code via a large nickname, which is not properly handled by the listen_thread_udp function.
EPSS
Процентиль: 96%
0.26993
Средний
7.5 High
CVSS2
Дефекты
NVD-CWE-Other