Vulnerability Description
Stack-based buffer overflow in DecodeBase16 function, as used in the (1) IRC module and (2) web server in eMule 0.42d, allows remote attackers to execute arbitrary code via a long string.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Emule | Emule | 0.42d |
References
- http://marc.info/?l=bugtraq&m=108100987429960&w=2
- http://secunia.com/advisories/11289Patch
- http://www.emule-project.net/home/perl/news.cgi?l=1&cat_id=22PatchVendor Advisory
- http://www.securityfocus.com/bid/10039PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15730
- http://marc.info/?l=bugtraq&m=108100987429960&w=2
- http://secunia.com/advisories/11289Patch
- http://www.emule-project.net/home/perl/news.cgi?l=1&cat_id=22PatchVendor Advisory
- http://www.securityfocus.com/bid/10039PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15730
FAQ
What is CVE-2004-1892?
CVE-2004-1892 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in DecodeBase16 function, as used in the (1) IRC module and (2) web server in eMule 0.42d, allows remote attackers to execute arbitrary code via a long string.
How severe is CVE-2004-1892?
CVE-2004-1892 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1892?
Check the references section above for vendor advisories and patch information. Affected products include: Emule Emule.