GGZ Gaming Zone 0.0.12 allows remote attackers to cause a denial of service (client disconnect) via inputs that produce malformed XML, including (1) trailing ' (apostrophe) character on the ID attribute in a PLAYER XML tag, (2) joining with a long ID attribute or non-trailing ' characters, which causes a <none> name to be assigned, and then disconnecting, or (3) a long CDATA message attribute, which prevents closing tags from being added to the string.
References
Link | Resource |
---|---|
http://aluigi.altervista.org/adv/ggzcdos-adv.txt | Exploit Vendor Advisory |
http://secunia.com/advisories/19212 | Vendor Advisory |
http://www.osvdb.org/23848 | |
http://www.securityfocus.com/bid/17094 | Exploit |
http://www.vupen.com/english/advisories/2006/0935 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25164 |
Configurations
History
No history.
Information
Published : 2006-03-19 11:06
Updated : 2024-02-04 16:52
NVD link : CVE-2006-1275
Mitre link : CVE-2006-1275
CVE.ORG link : CVE-2006-1275
JSON object : View
Products Affected
ggz_gaming_zone
- ggz_gaming_zone
CWE
CWE-399
Resource Management Errors