DProxy Stack-Based Buffer-Overflow Vulnerability

Dproxy is prone to a stack-based buffer-overflow vulnerability because it fails to properly check boundaries on user-supplied data before copying it to an insufficiently sized buffer.

Exploiting this issue could lead to denial-of-service conditions and to the execution of arbitrary machine code in the context of the service.


 

Privacy Statement
Copyright 2010, SecurityFocus