A vulnerability, which was classified as critical, was found in ayttm up to 0.5.0.89. This affects the function http_connect in the library libproxy/proxy.c. The manipulation leads to format string. It is possible to initiate the attack remotely. The name of the patch is 40e04680018614a7d2b68566b261b061a0597046. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222267.
References
| Link | Resource |
|---|---|
| https://github.com/ayttm/ayttm/commit/40e04680018614a7d2b68566b261b061a0597046 | Patch |
| https://sourceforge.net/p/ayttm/mailman/message/34397158/ | Third Party Advisory |
| https://vuldb.com/?ctiid.222267 | Permissions Required Third Party Advisory |
| https://vuldb.com/?id.222267 | Third Party Advisory |
| https://github.com/ayttm/ayttm/commit/40e04680018614a7d2b68566b261b061a0597046 | Patch |
| https://sourceforge.net/p/ayttm/mailman/message/34397158/ | Third Party Advisory |
| https://vuldb.com/?ctiid.222267 | Permissions Required Third Party Advisory |
| https://vuldb.com/?id.222267 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:24
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/ayttm/ayttm/commit/40e04680018614a7d2b68566b261b061a0597046 - Patch | |
| References | () https://sourceforge.net/p/ayttm/mailman/message/34397158/ - Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.222267 - Permissions Required, Third Party Advisory | |
| References | () https://vuldb.com/?id.222267 - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 5.0 |
15 Feb 2024, 20:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/ayttm/ayttm/commit/40e04680018614a7d2b68566b261b061a0597046 - Patch | |
| References | () https://vuldb.com/?ctiid.222267 - Permissions Required, Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 8.1 |
13 Mar 2023, 16:55
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) https://sourceforge.net/p/ayttm/mailman/message/34397158/ - Third Party Advisory | |
| References | (MISC) https://github.com/ayttm/ayttm/commit/40e04680018614a7d2b68566b261b061a0597046 - Patch, Third Party Advisory | |
| References | (MISC) https://vuldb.com/?ctiid.222267 - Permissions Required | |
| References | (MISC) https://vuldb.com/?id.222267 - Third Party Advisory | |
| CPE | cpe:2.3:a:ayttm_project:ayttm:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
06 Mar 2023, 04:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-03-05 05:15
Updated : 2024-11-21 02:24
NVD link : CVE-2015-10088
Mitre link : CVE-2015-10088
CVE.ORG link : CVE-2015-10088
JSON object : View
Products Affected
ayttm_project
- ayttm
CWE
CWE-134
Use of Externally-Controlled Format String
