A vulnerability, which was classified as critical, was found in ayttm up to 0.5.0.89. This affects the function http_connect in the library libproxy/proxy.c. The manipulation leads to format string. It is possible to initiate the attack remotely. The name of the patch is 40e04680018614a7d2b68566b261b061a0597046. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222267.
References
Link | Resource |
---|---|
https://github.com/ayttm/ayttm/commit/40e04680018614a7d2b68566b261b061a0597046 | Patch |
https://sourceforge.net/p/ayttm/mailman/message/34397158/ | Third Party Advisory |
https://vuldb.com/?ctiid.222267 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.222267 | Third Party Advisory |
https://github.com/ayttm/ayttm/commit/40e04680018614a7d2b68566b261b061a0597046 | Patch |
https://sourceforge.net/p/ayttm/mailman/message/34397158/ | Third Party Advisory |
https://vuldb.com/?ctiid.222267 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.222267 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:24
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 5.0 |
References | () https://github.com/ayttm/ayttm/commit/40e04680018614a7d2b68566b261b061a0597046 - Patch | |
References | () https://sourceforge.net/p/ayttm/mailman/message/34397158/ - Third Party Advisory | |
References | () https://vuldb.com/?ctiid.222267 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.222267 - Third Party Advisory |
15 Feb 2024, 20:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/ayttm/ayttm/commit/40e04680018614a7d2b68566b261b061a0597046 - Patch | |
References | () https://vuldb.com/?ctiid.222267 - Permissions Required, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 8.1 |
13 Mar 2023, 16:55
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://sourceforge.net/p/ayttm/mailman/message/34397158/ - Third Party Advisory | |
References | (MISC) https://github.com/ayttm/ayttm/commit/40e04680018614a7d2b68566b261b061a0597046 - Patch, Third Party Advisory | |
References | (MISC) https://vuldb.com/?ctiid.222267 - Permissions Required | |
References | (MISC) https://vuldb.com/?id.222267 - Third Party Advisory | |
CPE | cpe:2.3:a:ayttm_project:ayttm:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
06 Mar 2023, 04:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-05 05:15
Updated : 2024-11-21 02:24
NVD link : CVE-2015-10088
Mitre link : CVE-2015-10088
CVE.ORG link : CVE-2015-10088
JSON object : View
Products Affected
ayttm_project
- ayttm
CWE
CWE-134
Use of Externally-Controlled Format String