Exploit Irssi 0.8.13 - 'WALLOPS' Message Off-by-One Heap Memory Corruption

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
33041
Проверка EDB
  1. Пройдено
Автор
NEMO
Тип уязвимости
DOS
Платформа
LINUX
CVE
cve-2009-1959
Дата публикации
2009-05-15
Код:
source: https://www.securityfocus.com/bid/35399/info

Irssi is prone to an off-by-one, heap-based, memory-corruption vulnerability because it fails to properly bounds-check user-supplied data before copying it into a memory buffer.

Attackers can exploit this issue to crash the vulnerable client, resulting in a denial-of-service condition. Given the nature of this issue, attackers may also be able to run arbitrary code within the context of the vulnerable application, but this has not been confirmed.

Iirssi 0.8.13 is vulnerable; other versions may also be affected. 

The following example IRC command is available; please see the references for more information.

: WALLOPS \001ACTION
 
Источник
www.exploit-db.com

Похожие темы