1 results (0.012 seconds)

CVSS: 6.8EPSS: 27%CPEs: 2EXPL: 2

Stack-based buffer overflow in Rebellion Asura engine, as used for the server in Rogue Trooper 1.0 and earlier and Prism 1.1.1.0 and earlier, allows remote attackers to execute arbitrary code via a long string in a 0xf007 packet for the challenge B query. Desbordamiento de búfer basado en pila en el motor Rebellion Asura, tal y como se utiliza para el servidor en Rogue Trooper 1.0 y anteriores y Prism 1.1.1.0 y anteriores, permite a atacantes remotos ejecutar código de su elección a través de una cadena larga en un paquete 0xf007 para la pregunta de reto B. • https://www.exploit-db.com/exploits/30519 http://aluigi.altervista.org/adv/asurabof-adv.txt http://osvdb.org/39799 http://secunia.com/advisories/24023 http://secunia.com/advisories/26571 http://securityreason.com/securityalert/3053 http://www.securityfocus.com/archive/1/477357/100/0/threaded http://www.securityfocus.com/bid/25411 http://www.vupen.com/english/advisories/2007/2955 http://www.vupen.com/english/advisories/2007/2956 https://exchange.xforce.ibmcloud.com/vulnerabi •