Stack-based buffer overflow in lpd.exe in Mocha W32 LPD 1.9 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted "recieve jobs" request. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 01:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/39394 - Vendor Advisory | |
References | () http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-023-mocha-lpd-remote-buffer-overflow/ - | |
References | () http://www.corelan.be:8800/wp-content/forum-file-uploads/mr_me/mochalpd.py_.txt - | |
References | () http://www.osvdb.org/63902 - |
Information
Published : 2010-05-04 16:00
Updated : 2024-11-21 01:14
NVD link : CVE-2010-1687
Mitre link : CVE-2010-1687
CVE.ORG link : CVE-2010-1687
JSON object : View
Products Affected
mochasoft
- mocha_w32_lpd
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer