Darxite 0.4 Login Buffer Overflow Vulnerability

Darxite 0.4 does not do proper bounds checking on user-supplied data during the login process, relying on sprintf() to deliver the data into a 256 character buffer. Therefore, it is possible for an attacker to supply arbitrary code for execution at the privilege level of the Darxite user.


 

Privacy Statement
Copyright 2010, SecurityFocus