Format string vulnerability in dx8render.dll in Snail Game (aka Suzhou Snail Electronic Company) 5th street (aka Hot Step or High Street 5) allows remote attackers to execute arbitrary code via format string specifiers in a chat message.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/43370 | vdb entry |
http://www.securityfocus.com/archive/1/493649/100/0/threaded | mailing list |
http://securityreason.com/securityalert/3982 | third party advisory |
http://www.securityfocus.com/bid/29928 | vdb entry |