Vulnerability CVE-2007-4642


Published: 2007-08-31   Modified: 2012-02-12

Description:
Multiple buffer overflows in Doomsday (aka deng) 1.9.0-beta5.1 and earlier allow remote attackers to execute arbitrary code via a long chat (PKT_CHAT) message that is not properly handled by the (1) D_NetPlayerEvent function in d_net.c or the (2) Msg_Write function in net_msg.c, or (3) many commands that are not properly handled by the NetSv_ReadCommands function in d_netsv.c; or (4) cause a denial of service (daemon crash) via a chat (PKT_CHAT) message without a final '\0' character.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Multiple vulnerabilities in Doomsday 1.9.0-beta5.1
Luigi Auriemma
04.09.2007

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Doomsday -> Doomsday 

 References:
http://aluigi.altervista.org/adv/dumsdei-adv.txt
http://aluigi.org/poc/dumsdei.zip
http://bugs.gentoo.org/show_bug.cgi?id=190835
http://security.gentoo.org/glsa/glsa-200802-02.xml
http://securityreason.com/securityalert/3084
http://www.securityfocus.com/archive/1/478077/100/0/threaded
http://www.securityfocus.com/bid/25483
https://exchange.xforce.ibmcloud.com/vulnerabilities/36332
https://exchange.xforce.ibmcloud.com/vulnerabilities/36333
https://exchange.xforce.ibmcloud.com/vulnerabilities/36334

Copyright 2024, cxsecurity.com

 

Back to Top