Vulnerability Description
The server in Toribash 2.71 and earlier does not properly handle long commands, which allows remote attackers to trigger a protocol violation in which data is sent to other clients without a required LF character, as demonstrated by a SAY command. NOTE: the security impact of this violation is not clear, although it probably makes exploitation of CVE-2007-4449 easier.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Toribash | Toribash | <= 2.71 |
Related Weaknesses (CWE)
References
- http://aluigi.org/poc/toribashish.zipExploit
- http://secunia.com/advisories/26507Vendor Advisory
- http://securityreason.com/securityalert/3033
- http://www.securityfocus.com/archive/1/477025/100/0/threaded
- http://www.securityfocus.com/bid/25359Exploit
- http://aluigi.org/poc/toribashish.zipExploit
- http://secunia.com/advisories/26507Vendor Advisory
- http://securityreason.com/securityalert/3033
- http://www.securityfocus.com/archive/1/477025/100/0/threaded
- http://www.securityfocus.com/bid/25359Exploit
FAQ
What is CVE-2007-4450?
CVE-2007-4450 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The server in Toribash 2.71 and earlier does not properly handle long commands, which allows remote attackers to trigger a protocol violation in which data is sent to other clients without a required ...
How severe is CVE-2007-4450?
CVE-2007-4450 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-4450?
Check the references section above for vendor advisories and patch information. Affected products include: Toribash Toribash.