Lucene search

K
exploitdbLuigi AuriemmaEDB-ID:30528
HistoryAug 24, 2007 - 12:00 a.m.

Vavoom 1.24 - 'p_thinker.cpp VThinker::BroadcastPrintf' Multiple Remote Overflows

2007-08-2400:00:00
Luigi Auriemma
www.exploit-db.com
21

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/25436/info
  
Vavoom is prone to multiple remote vulnerabilities, including a buffer-overflow issue, a format-string issue, and a denial-of-service issue.
  
An attacker can exploit these issues to execute arbitrary code within the context of the affected application or crash the application, denying service to legitimate users.
  
Vavoom 1.24 is vulnerable; prior versions may also be affected. 

For the buffer-overflow vulnerability, the attacker opens the 'vavoom\basev\doom2\config.cfg' file, and adds the following lines:'alias bof "say aaa...(992_'a's)...aaa" name ''aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'' '

AI Score

7.4

Confidence

Low