header-logo
Suggest Exploit
vendor:
Daemon
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Daemon
Affected Version From: 0.7.0
Affected Version To: CVS July 30th 2006
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

DConnect Daemon Buffer Overflow Vulnerability

DConnect Daemon is prone to a buffer-overflow vulnerability because the library fails to do proper boundary checks before copying user-supplied data into a finite-sized buffer. This issue allows remote attackers to execute arbitrary code within the context of the application or cause the application to crash causing a denial of service.

Mitigation:

Ensure that proper boundary checks are performed before copying user-supplied data into a finite-sized buffer.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/19369/info

DConnect Daemon is prone to a buffer-overflow vulnerability because the library fails to do proper boundary checks before copying user-supplied data into a finite-sized buffer.

This issue allows remote attackers to execute arbitrary code within the context of the application or cause the application to crash causing a denial of service. 

Version 0.7.0, CVS July 30th 2006 and prior versions are vulnerable to this issue.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28345.zip