The Palace Graphical Chat客户端远程缓冲区溢出漏洞

漏洞信息详情

The Palace Graphical Chat客户端远程缓冲区溢出漏洞

漏洞简介

Palace 3.5及其更早版本的客户端存在基于栈的缓冲区溢出漏洞。远程用户可以通过一个到palace:// url并带有长服务器地址字符串的链接执行任意代码。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: XF
名称: palace-server-address-bo(15074)
链接:http://xforce.iss.net/xforce/xfdb/15074

来源: BID
名称: 9602
链接:http://www.securityfocus.com/bid/9602

来源: www.elitehaven.net
链接:http://www.elitehaven.net/thepalace.txt

来源: BUGTRAQ
名称: 20040207 The Palace 3.x (Client) Stack Overflow Vulnerability
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=107634556632195&w=2

来源: VULNWATCH
名称: 20040207 The Palace 3.x (Client) Stack Overflow Vulnerability
链接:http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0033.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享