Vulnerability Description
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnome | Gtk | 2.10.4 |
| Xchat | Xchat | < 2.8.6 |
| Xchat-Wdk | Xchat-Wdk | < 1499-4 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2012/02/01/9Mailing ListThird Party Advisory
- https://access.redhat.com/security/cve/cve-2012-0828Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828Issue TrackingPatchThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2012-0828Third Party Advisory
- http://www.openwall.com/lists/oss-security/2012/02/01/9Mailing ListThird Party Advisory
- https://access.redhat.com/security/cve/cve-2012-0828Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-0828Issue TrackingPatchThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2012-0828Third Party Advisory
FAQ
What is CVE-2012-0828?
CVE-2012-0828 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary...
How severe is CVE-2012-0828?
CVE-2012-0828 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2012-0828?
Check the references section above for vendor advisories and patch information. Affected products include: Gnome Gtk, Xchat Xchat, Xchat-Wdk Xchat-Wdk.