9 lines
No EOL
569 B
Text
9 lines
No EOL
569 B
Text
source: https://www.securityfocus.com/bid/19369/info
|
|
|
|
DConnect Daemon is prone to a buffer-overflow vulnerability because the library fails to do proper boundary checks before copying user-supplied data into a finite-sized buffer.
|
|
|
|
This issue allows remote attackers to execute arbitrary code within the context of the application or cause the application to crash causing a denial of service.
|
|
|
|
Version 0.7.0, CVS July 30th 2006 and prior versions are vulnerable to this issue.
|
|
|
|
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28345.zip |