Vulnerability Description
Stack-based buffer overflow in a certain ActiveX control in GLChat.ocx 2.5.1.32 in GlobalLink 2.7.0.8, as used in Ourgame GLWorld and possibly other products, allows remote attackers to execute arbitrary code via a long first argument to the ConnectAndEnterRoom method, possibly involving the GLCHAT.GLChatCtrl.1 control, as originally exploited in the wild in October 2007. NOTE: some of these details are obtained from third party information. NOTE: this was originally reported as a heap-based issue by some sources.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ourgame.Com | Globallink | All versions |
| Ourgame.Com | Glworld | All versions |
Related Weaknesses (CWE)
References
- http://osvdb.org/38837
- http://secunia.com/advisories/27500Vendor Advisory
- http://www.securityfocus.com/bid/26244Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38222
- http://osvdb.org/38837
- http://secunia.com/advisories/27500Vendor Advisory
- http://www.securityfocus.com/bid/26244Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38222
FAQ
What is CVE-2007-5722?
CVE-2007-5722 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in a certain ActiveX control in GLChat.ocx 2.5.1.32 in GlobalLink 2.7.0.8, as used in Ourgame GLWorld and possibly other products, allows remote attackers to execute arbitr...
How severe is CVE-2007-5722?
CVE-2007-5722 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-5722?
Check the references section above for vendor advisories and patch information. Affected products include: Ourgame.Com Globallink, Ourgame.Com Glworld.