Vulnerability Description
Multiple off-by-one errors in VooDoo cIRCle before 1.1.beta27 allow remote attackers to cause a denial of service (connection loss) or possibly execute arbitrary code via a (1) DNS name response of the exact length as a buffer; or a long (2) channel name, (3) partyline channel name, or unspecified vectors in crafted BOTNET packets.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Voodoo Circle | Voodoo Circle | 1.0 |
References
- http://osvdb.org/41985
- http://osvdb.org/41986
- http://sourceforge.net/project/shownotes.php?release_id=497807&group_id=116847Patch
- http://www.securityfocus.com/bid/23929
- http://www.vupen.com/english/advisories/2007/1756
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34229
- http://osvdb.org/41985
- http://osvdb.org/41986
- http://sourceforge.net/project/shownotes.php?release_id=497807&group_id=116847Patch
- http://www.securityfocus.com/bid/23929
- http://www.vupen.com/english/advisories/2007/1756
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34229
FAQ
What is CVE-2007-2651?
CVE-2007-2651 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple off-by-one errors in VooDoo cIRCle before 1.1.beta27 allow remote attackers to cause a denial of service (connection loss) or possibly execute arbitrary code via a (1) DNS name response of th...
How severe is CVE-2007-2651?
CVE-2007-2651 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2651?
Check the references section above for vendor advisories and patch information. Affected products include: Voodoo Circle Voodoo Circle.