CVE-2008-6393

PSI Jabber client before 0.12.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a file transfer request with a negative value in a SOCKS5 option, which bypasses a signed integer check and triggers an integer overflow and a heap-based buffer overflow.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=252830 Exploit
http://jolmos.blogspot.com/2008/12/psi-remote-integer-overflow.html
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
http://secunia.com/advisories/33311 Vendor Advisory
http://secunia.com/advisories/34119
http://secunia.com/advisories/34259
http://secunia.com/advisories/34301
http://sourceforge.net/project/shownotes.php?release_id=658912 Patch
http://www.debian.org/security/2009/dsa-1741
http://www.openwall.com/lists/oss-security/2009/02/25/5 Exploit
http://www.securityfocus.com/archive/1/499563 Exploit
https://www.exploit-db.com/exploits/7555
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00071.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00080.html
http://bugs.gentoo.org/show_bug.cgi?id=252830 Exploit
http://jolmos.blogspot.com/2008/12/psi-remote-integer-overflow.html
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
http://secunia.com/advisories/33311 Vendor Advisory
http://secunia.com/advisories/34119
http://secunia.com/advisories/34259
http://secunia.com/advisories/34301
http://sourceforge.net/project/shownotes.php?release_id=658912 Patch
http://www.debian.org/security/2009/dsa-1741
http://www.openwall.com/lists/oss-security/2009/02/25/5 Exploit
http://www.securityfocus.com/archive/1/499563 Exploit
https://www.exploit-db.com/exploits/7555
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00071.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00080.html
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:psi-im:psi:*:*:*:*:*:*:*:*
cpe:2.3:a:psi-im:psi:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:psi-im:psi:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:psi-im:psi:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:psi-im:psi:0.9:*:*:*:*:*:*:*
cpe:2.3:a:psi-im:psi:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:psi-im:psi:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:psi-im:psi:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:psi-im:psi:0.11:*:*:*:*:*:*:*
cpe:2.3:a:jabber:jabber_client:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:56

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?id=252830 - Exploit () http://bugs.gentoo.org/show_bug.cgi?id=252830 - Exploit
References () http://jolmos.blogspot.com/2008/12/psi-remote-integer-overflow.html - () http://jolmos.blogspot.com/2008/12/psi-remote-integer-overflow.html -
References () http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html -
References () http://secunia.com/advisories/33311 - Vendor Advisory () http://secunia.com/advisories/33311 - Vendor Advisory
References () http://secunia.com/advisories/34119 - () http://secunia.com/advisories/34119 -
References () http://secunia.com/advisories/34259 - () http://secunia.com/advisories/34259 -
References () http://secunia.com/advisories/34301 - () http://secunia.com/advisories/34301 -
References () http://sourceforge.net/project/shownotes.php?release_id=658912 - Patch () http://sourceforge.net/project/shownotes.php?release_id=658912 - Patch
References () http://www.debian.org/security/2009/dsa-1741 - () http://www.debian.org/security/2009/dsa-1741 -
References () http://www.openwall.com/lists/oss-security/2009/02/25/5 - Exploit () http://www.openwall.com/lists/oss-security/2009/02/25/5 - Exploit
References () http://www.securityfocus.com/archive/1/499563 - Exploit () http://www.securityfocus.com/archive/1/499563 - Exploit
References () https://www.exploit-db.com/exploits/7555 - () https://www.exploit-db.com/exploits/7555 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00071.html - () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00071.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00080.html - () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00080.html -

Information

Published : 2009-03-03 16:30

Updated : 2024-11-21 00:56


NVD link : CVE-2008-6393

Mitre link : CVE-2008-6393

CVE.ORG link : CVE-2008-6393


JSON object : View

Products Affected

jabber

  • jabber_client

psi-im

  • psi
CWE
CWE-189

Numeric Errors