7 lines
No EOL
429 B
Text
Executable file
7 lines
No EOL
429 B
Text
Executable file
source: http://www.securityfocus.com/bid/13781/info
|
|
|
|
C'Nedra Network Plug-in is prone to a remotely exploitable buffer overflow vulnerability. The issue exists in the 'game_message_functions.cpp' source file and is due to inadequate bounds checking of user-supplied data.
|
|
|
|
This vulnerability could be exploited to execute arbitrary code in the context of the affected software.
|
|
|
|
http://www.exploit-db.com/sploits/25710.zip |