Lucene search

K
exploitdbLuigi AuriemmaEDB-ID:30526
HistoryAug 24, 2007 - 12:00 a.m.

Vavoom 1.24 - sv_main.cpp Say Command Remote Format String

2007-08-2400:00:00
Luigi Auriemma
www.exploit-db.com
16

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/25436/info

Vavoom is prone to multiple remote vulnerabilities, including a buffer-overflow issue, a format-string issue, and a denial-of-service issue.

An attacker can exploit these issues to execute arbitrary code within the context of the affected application or crash the application, denying service to legitimate users.

Vavoom 1.24 is vulnerable; prior versions may also be affected. 

For the format-string vulnerability, an attacker sends a chat message containing '%n%n%n%n%s' string.

AI Score

7.4

Confidence

Low