exploit-db-mirror/platforms/multiple/remote/28344.txt
Offensive Security 5924dde297 DB: 2015-03-19
2 new exploits
2015-03-19 09:39:10 +00:00

9 lines
No EOL
582 B
Text
Executable file

source: http://www.securityfocus.com/bid/19369/info
DConnect Daemon is prone to a buffer-overflow vulnerability because the library fails to do proper boundary checks before copying user-supplied data into a finite-sized buffer.
This issue allows remote attackers to execute arbitrary code within the context of the application or cause the application to crash causing a denial of service.
Version 0.7.0, CVS July 30th 2006 and prior versions are vulnerable to this issue.
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/28344.zip