Vulnerability Description
Stack-based buffer overflow in Bloodshed Dev-C++ 4.9.9.2 allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long line in a .cpp file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bloodshed Software | Dev-C\+\+ | 4.9.9.2 |
References
- http://osvdb.org/38131
- http://www.securityfocus.com/bid/22315Exploit
- https://www.exploit-db.com/exploits/3229
- http://osvdb.org/38131
- http://www.securityfocus.com/bid/22315Exploit
- https://www.exploit-db.com/exploits/3229
FAQ
What is CVE-2007-0643?
CVE-2007-0643 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Stack-based buffer overflow in Bloodshed Dev-C++ 4.9.9.2 allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long line in a...
How severe is CVE-2007-0643?
CVE-2007-0643 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-0643?
Check the references section above for vendor advisories and patch information. Affected products include: Bloodshed Software Dev-C\+\+.