CVE-2007-0160
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in the LiveJournal support (hooks/ljhook.cc) in CenterICQ 4.9.11 through 4.21.0, when using unofficial LiveJournal servers, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by adding the victim as a friend and using long (1) username and (2) real name strings.
Un desbordamiento de búfer en la región stack de la memoria en el soporte LiveJournal (hooks/ljhook.cc) en CenterICQ versión 4.9.11 hasta versión 4.21.0, cuando se utilizan servidores LiveJournal no oficiales, permite a los atacantes remotos causar una denegación de servicio (bloqueo) y posiblemente ejecutar código arbitrario mediante la adición de la víctima como amigo y el uso de (1) nombre de usuario largos y (2) cadenas de nombre real largas.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-01-09 CVE Reserved
- 2007-01-10 CVE Published
- 2023-10-06 EPSS Updated
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://osvdb.org/33408 | Vdb Entry | |
http://securityreason.com/securityalert/2129 | Third Party Advisory | |
http://securitytracker.com/id?1017545 | Vdb Entry | |
http://www.securityfocus.com/archive/1/456255/100/0/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/31330 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/21932 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.gentoo.org/security/en/glsa/glsa-200701-20.xml | 2018-10-16 | |
http://www.vupen.com/english/advisories/2007/0306 | 2018-10-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Centericq Search vendor "Centericq" | Centericq Search vendor "Centericq" for product "Centericq" | 4.9.11 Search vendor "Centericq" for product "Centericq" and version "4.9.11" | - |
Affected
| ||||||
Centericq Search vendor "Centericq" | Centericq Search vendor "Centericq" for product "Centericq" | 4.9.12 Search vendor "Centericq" for product "Centericq" and version "4.9.12" | - |
Affected
| ||||||
Centericq Search vendor "Centericq" | Centericq Search vendor "Centericq" for product "Centericq" | 4.12 Search vendor "Centericq" for product "Centericq" and version "4.12" | - |
Affected
| ||||||
Centericq Search vendor "Centericq" | Centericq Search vendor "Centericq" for product "Centericq" | 4.13 Search vendor "Centericq" for product "Centericq" and version "4.13" | - |
Affected
| ||||||
Centericq Search vendor "Centericq" | Centericq Search vendor "Centericq" for product "Centericq" | 4.14 Search vendor "Centericq" for product "Centericq" and version "4.14" | - |
Affected
| ||||||
Centericq Search vendor "Centericq" | Centericq Search vendor "Centericq" for product "Centericq" | 4.20 Search vendor "Centericq" for product "Centericq" and version "4.20" | - |
Affected
| ||||||
Centericq Search vendor "Centericq" | Centericq Search vendor "Centericq" for product "Centericq" | 4.21 Search vendor "Centericq" for product "Centericq" and version "4.21" | - |
Affected
|