CVE-2010-1687

Stack-based buffer overflow in lpd.exe in Mocha W32 LPD 1.9 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted "recieve jobs" request. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mochasoft:mocha_w32_lpd:1.9:*:*:*:*:*:*:*

History

21 Nov 2024, 01:14

Type Values Removed Values Added
References () http://secunia.com/advisories/39394 - Vendor Advisory () http://secunia.com/advisories/39394 - Vendor Advisory
References () http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-023-mocha-lpd-remote-buffer-overflow/ - () http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-023-mocha-lpd-remote-buffer-overflow/ -
References () http://www.corelan.be:8800/wp-content/forum-file-uploads/mr_me/mochalpd.py_.txt - () http://www.corelan.be:8800/wp-content/forum-file-uploads/mr_me/mochalpd.py_.txt -
References () http://www.osvdb.org/63902 - () http://www.osvdb.org/63902 -

Information

Published : 2010-05-04 16:00

Updated : 2024-11-21 01:14


NVD link : CVE-2010-1687

Mitre link : CVE-2010-1687

CVE.ORG link : CVE-2010-1687


JSON object : View

Products Affected

mochasoft

  • mocha_w32_lpd
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer