Darxite 0.4 Login Buffer Overflow Vulnerability
BID:1598
Info
Darxite 0.4 Login Buffer Overflow Vulnerability
| Bugtraq ID: | 1598 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Yes |
| Local: | Yes |
| Published: | Aug 22 2000 12:00AM |
| Updated: | Aug 22 2000 12:00AM |
| Credit: | Posted to Bugtraq on August 22, 2000 by Guido Bakker <[email protected]>. |
| Vulnerable: |
Ashley Montanaro Darxite 0.4 |
| Not Vulnerable: | |
Discussion
Darxite 0.4 Login Buffer Overflow Vulnerability
Darxite 0.4 does not do proper bounds checking on user-supplied data during the login process, relying on sprintf() to deliver the data into a 256 character buffer. Therefore, it is possible for an attacker to supply arbitrary code for execution at the privilege level of the Darxite user.
Darxite 0.4 does not do proper bounds checking on user-supplied data during the login process, relying on sprintf() to deliver the data into a 256 character buffer. Therefore, it is possible for an attacker to supply arbitrary code for execution at the privilege level of the Darxite user.
Exploit / POC
Darxite 0.4 Login Buffer Overflow Vulnerability
An exploit has been made available.
An exploit has been made available.
Solution / Fix
Darxite 0.4 Login Buffer Overflow Vulnerability
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].