CVE-2008-2748

Skulltag 0.97d2-RC2 and earlier allows remote attackers to cause a denial of service (daemon hang) via a series of long, malformed connect packets, related to these packets being "parsed multiple times."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:skulltag_team:skulltag:0.95c:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.95d:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.95e:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.95f:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.95g:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.95h:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.95i:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.95j:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.95k:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.96b:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.96c:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.96d:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.96e:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.96f:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97b:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97c:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97c2:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97c3:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97d:*:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97d:beta_1:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97d:beta_2:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97d:beta_3:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97d:beta_4:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97d:beta_4.1:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97d:beta_4.2:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97d:beta_4.3:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97d:rc10:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97d:rc9:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97d2:rc2:*:*:*:*:*:*
cpe:2.3:a:skulltag_team:skulltag:0.97d2:rc3:*:*:*:*:*:*

History

21 Nov 2024, 00:47

Type Values Removed Values Added
References () http://aluigi.org/poc/skulltagloop.zip - () http://aluigi.org/poc/skulltagloop.zip -
References () http://secunia.com/advisories/30668 - Vendor Advisory () http://secunia.com/advisories/30668 - Vendor Advisory
References () http://securityreason.com/securityalert/3953 - () http://securityreason.com/securityalert/3953 -
References () http://skulltag.com/testing/public/Skulltag%20Version%20History.txt - () http://skulltag.com/testing/public/Skulltag%20Version%20History.txt -
References () http://www.securityfocus.com/archive/1/493386/100/0/threaded - () http://www.securityfocus.com/archive/1/493386/100/0/threaded -
References () http://www.securityfocus.com/bid/29760 - () http://www.securityfocus.com/bid/29760 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/43125 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/43125 -

Information

Published : 2008-06-18 19:41

Updated : 2024-11-21 00:47


NVD link : CVE-2008-2748

Mitre link : CVE-2008-2748

CVE.ORG link : CVE-2008-2748


JSON object : View

Products Affected

skulltag_team

  • skulltag
CWE
CWE-20

Improper Input Validation