7.8
CVSSv2

CVE-2007-3917

Published: 11/10/2007 Updated: 29/07/2017
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The multiplayer engine in Wesnoth 1.2.x prior to 1.2.7 and 1.3.x prior to 1.3.9 allows remote servers to cause a denial of service (crash) via a long message with multibyte characters that can produce an invalid UTF-8 string after it is truncated, which triggers an uncaught exception, involving the truncate_message function in server/server.cpp. NOTE: this issue affects both clients and servers.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wesnoth wesnoth 1.2.6

wesnoth wesnoth 1.3.7

wesnoth wesnoth 1.3.6

wesnoth wesnoth 1.2.3

wesnoth wesnoth 1.2.2

wesnoth wesnoth 1.2.1

wesnoth wesnoth 1.3.3

wesnoth wesnoth 1.3.2

wesnoth wesnoth 1.2.5

wesnoth wesnoth 1.2.4

wesnoth wesnoth 1.3.5

wesnoth wesnoth 1.3.4

wesnoth wesnoth 1.2

wesnoth wesnoth 1.3.8

wesnoth wesnoth 1.3.1

Vendor Advisories

A problem has been discovered in the processing of chat messages Overly long messages are truncated by the server to a fixed length, without paying attention to the multibyte characters This leads to invalid UTF-8 on clients and causes an uncaught exception Note that both wesnoth and the wesnoth server are affected For the old stable distributi ...