Vulnerability Description
Multiple buffer overflows in Battlefront Dropteam 1.3.3 and earlier allow remote attackers to execute arbitrary code via (1) a crafted "0x5c" packet or (2) many 32-bit numbers in a "0x18" packet, or cause a denial of service (crash) via (3) a large "0x4b" packet.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Battlefront | Dropteam | <= 1.3.3 |
Related Weaknesses (CWE)
References
- http://aluigi.altervista.org/adv/dropteamz-adv.txtExploit
- http://secunia.com/advisories/27107Vendor Advisory
- http://securityreason.com/securityalert/3202
- http://www.securityfocus.com/archive/1/481616/100/0/threaded
- http://www.securityfocus.com/bid/25943Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36975
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36976
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36977
- http://aluigi.altervista.org/adv/dropteamz-adv.txtExploit
- http://secunia.com/advisories/27107Vendor Advisory
- http://securityreason.com/securityalert/3202
- http://www.securityfocus.com/archive/1/481616/100/0/threaded
- http://www.securityfocus.com/bid/25943Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36975
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36976
FAQ
What is CVE-2007-5263?
CVE-2007-5263 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple buffer overflows in Battlefront Dropteam 1.3.3 and earlier allow remote attackers to execute arbitrary code via (1) a crafted "0x5c" packet or (2) many 32-bit numbers in a "0x18" packet, or c...
How severe is CVE-2007-5263?
CVE-2007-5263 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-5263?
Check the references section above for vendor advisories and patch information. Affected products include: Battlefront Dropteam.