Format string vulnerability in the Say command in sv_main.cpp in Vavoom 1.24 and earlier allows remote attackers to execute arbitrary code via format string specifiers in a chat message, related to a call to the BroadcastPrintf function.
Link | Tags |
---|---|
http://secunia.com/advisories/26701 | third party advisory |
http://aluigi.altervista.org/adv/vaboom2-adv.txt | exploit |
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00094.html | vendor advisory |
http://securityreason.com/securityalert/3057 | third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36247 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=256621 | |
http://secunia.com/advisories/26554 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/25436 | vdb entry |