Stack-based buffer overflow in the ServerNetworking::incoming_client_data function in servnet.cpp in Outgun 1.0.3 bot 2 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a data_file_request command with a long (1) type or (2) name string.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 00:11
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://aluigi.altervista.org/adv/outgunx-adv.txt - Exploit | |
| References | () http://secunia.com/advisories/20098 - Exploit, Vendor Advisory | |
| References | () http://securityreason.com/securityalert/898 - | |
| References | () http://www.securityfocus.com/archive/1/433932/100/0/threaded - | |
| References | () http://www.securityfocus.com/bid/17985 - Exploit | |
| References | () http://www.vupen.com/english/advisories/2006/1796 - Vendor Advisory | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26509 - | 
Information
                Published : 2006-05-16 01:02
Updated : 2025-04-03 01:03
NVD link : CVE-2006-2399
Mitre link : CVE-2006-2399
CVE.ORG link : CVE-2006-2399
JSON object : View
Products Affected
                outgun
- outgun
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
