header-logo
Suggest Exploit
vendor:
Amaya
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Amaya
Affected Version From: 9.4
Affected Version To: 9.4
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2005

W3C Amaya Multiple Remote Buffer-Overflow Vulnerabilities

Amaya is susceptible to multiple remote buffer-overflow vulnerabilities. These issues are due to the application's failure to properly bounds-check user-supplied data before copying it to insufficiently sized memory buffers. Remote attackers may exploit this issue to execute arbitrary machine code in the context of the affected application. Failed exploit attempts likely crash the application.

Mitigation:

Upgrade to the latest version of Amaya.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/17507/info
 
W3C Amaya is susceptible to multiple remote buffer-overflow vulnerabilities. These issues are due to the application's failure to properly bounds-check user-supplied data before copying it to insufficiently sized memory buffers.
 
Remote attackers may exploit this issue to execute arbitrary machine code in the context of the affected application. Failed exploit attempts likely crash the application.
 
Amaya version 9.4 is affected by these issues; other versions may also be vulnerable.

<legend color="Ax200">