Stack-based buffer overflow in main.c in DConnect Daemon 0.7.0 and earlier allows remote attackers to execute arbitrary code via a large nickname, which is not properly handled by the listen_thread_udp function.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/442440/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2006/3181 | vdb entry |
http://secunia.com/advisories/21384 | exploit third party advisory vendor advisory |
http://securityreason.com/securityalert/1377 | third party advisory |
http://www.dc.ds.pg.gda.pl/ | patch |
http://www.securityfocus.com/bid/19369 | exploit vdb entry patch |
http://securitytracker.com/id?1016641 | vdb entry exploit |
http://www.dc.ds.pg.gda.pl/?page=doc&doc=changelog | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28276 | vdb entry |