Maxthon Browser Content-Type Buffer Overflow Vulnerability
BID:30617
Info
Maxthon Browser Content-Type Buffer Overflow Vulnerability
| Bugtraq ID: | 30617 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2008-3667 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 09 2008 12:00AM |
| Updated: | May 07 2015 05:25PM |
| Credit: | xman xman <[email protected]> |
| Vulnerable: |
Maxthon Maxthon 1.2.1 Maxthon Maxthon 1.2 Maxthon Maxthon 1.1.39 Maxthon Maxthon 1.6.3.80 |
| Not Vulnerable: | |
Discussion
Maxthon Browser Content-Type Buffer Overflow Vulnerability
Maxthon Browser is prone to a buffer-overflow vulnerability.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
Versions prior to Maxthon Browser 2.0 are vulnerable.
Maxthon Browser is prone to a buffer-overflow vulnerability.
An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
Versions prior to Maxthon Browser 2.0 are vulnerable.
Exploit / POC
Maxthon Browser Content-Type Buffer Overflow Vulnerability
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
The following proof of concept is available:
Currently we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
The following proof of concept is available:
Solution / Fix
Maxthon Browser Content-Type Buffer Overflow Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].