CVE-2008-3116

Format string vulnerability in dx8render.dll in Snail Game (aka Suzhou Snail Electronic Company) 5th street (aka Hot Step or High Street 5) allows remote attackers to execute arbitrary code via format string specifiers in a chat message.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:hanghai:5th_street:*:*:*:*:*:*:*:*
cpe:2.3:a:hanghai:high_street_5:*:*:*:*:*:*:*:*
cpe:2.3:a:hanghai:hot_step:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:48

Type Values Removed Values Added
References () http://securityreason.com/securityalert/3982 - () http://securityreason.com/securityalert/3982 -
References () http://www.securityfocus.com/archive/1/493649/100/0/threaded - () http://www.securityfocus.com/archive/1/493649/100/0/threaded -
References () http://www.securityfocus.com/bid/29928 - () http://www.securityfocus.com/bid/29928 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/43370 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/43370 -

Information

Published : 2008-07-10 17:41

Updated : 2024-11-21 00:48


NVD link : CVE-2008-3116

Mitre link : CVE-2008-3116

CVE.ORG link : CVE-2008-3116


JSON object : View

Products Affected

hanghai

  • hot_step
  • 5th_street
  • high_street_5
CWE
CWE-134

Use of Externally-Controlled Format String