header-logo
Suggest Exploit
vendor:
eDonkey Clients
by:
SecurityFocus
2.6
CVSS
LOW
Denial of Service
400
CWE
Product Name: eDonkey Clients
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: edonkey
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2002

eDonkey Clients for Windows Denial of Service Vulnerability

A vulnerability has been reported for eDonkey clients for Windows that will result in a denial of service condition. The vulnerability occurs when numerous chat dialog boxes are opened by the eDonkey or Overnet clients. Every open chat dialog box will consume a small amount of memory and CPU cycles. An attacker can exploit this vulnerability by connecting to a vulnerable eDonkey user and issuing numerous chat requests.

Mitigation:

Limit the number of chat dialog boxes that can be opened.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/7164/info

A vulnerability has been reported for eDonkey clients for Windows that will result in a denial of service condition.

The vulnerability occurs when numerous chat dialog boxes are opened by the eDonkey or Overnet clients. Every open chat dialog box will consume a small amount of memory and CPU cycles. 

An attacker can exploit this vulnerability by connecting to a vulnerable eDonkey user and issuing numerous chat requests.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22420.zip