The decryption function in Flagship Industries Ventrilo 3.0.2 and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) by sending a type 0 packet with an invalid version followed by another packet to TCP port 3784.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/44428 | vdb entry |
http://security.gentoo.org/glsa/glsa-200904-13.xml | vendor advisory |
http://www.securityfocus.com/archive/1/495448/100/0/threaded | mailing list |
http://securityreason.com/securityalert/4156 | third party advisory |
https://www.exploit-db.com/exploits/6237 | exploit |
http://secunia.com/advisories/34696 | third party advisory |
http://aluigi.org/poc/ventrilobotomy.zip | exploit |
http://aluigi.altervista.org/adv/ventrilobotomy-adv.txt | |
http://secunia.com/advisories/31466 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/30675 | vdb entry exploit |
http://www.vupen.com/english/advisories/2008/2365 | vdb entry |