PSI Jabber client before 0.12.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a file transfer request with a negative value in a SOCKS5 option, which bypasses a signed integer check and triggers an integer overflow and a heap-based buffer overflow.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://secunia.com/advisories/34259 | third party advisory |
http://bugs.gentoo.org/show_bug.cgi?id=252830 | exploit |
http://secunia.com/advisories/34301 | third party advisory |
https://www.exploit-db.com/exploits/7555 | exploit |
http://www.securityfocus.com/archive/1/499563 | mailing list exploit |
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html | vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00071.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2009/02/25/5 | mailing list exploit |
http://jolmos.blogspot.com/2008/12/psi-remote-integer-overflow.html | |
http://sourceforge.net/project/shownotes.php?release_id=658912 | patch |
http://secunia.com/advisories/33311 | third party advisory vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00080.html | vendor advisory |
http://www.debian.org/security/2009/dsa-1741 | vendor advisory |
http://secunia.com/advisories/34119 | third party advisory |