Format string vulnerability in dx8render.dll in Snail Game (aka Suzhou Snail Electronic Company) 5th street (aka Hot Step or High Street 5) allows remote attackers to execute arbitrary code via format string specifiers in a chat message.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://securityreason.com/securityalert/3982 - | |
References | () http://www.securityfocus.com/archive/1/493649/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/29928 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/43370 - |
Information
Published : 2008-07-10 17:41
Updated : 2024-11-21 00:48
NVD link : CVE-2008-3116
Mitre link : CVE-2008-3116
CVE.ORG link : CVE-2008-3116
JSON object : View
Products Affected
hanghai
- hot_step
- 5th_street
- high_street_5
CWE
CWE-134
Use of Externally-Controlled Format String