10
CVSSv2

CVE-2008-6393

Published: 03/03/2009 Updated: 29/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

PSI Jabber client prior to 0.12.1 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a file transfer request with a negative value in a SOCKS5 option, which bypasses a signed integer check and triggers an integer overflow and a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

psi-im psi 0.9.2

psi-im psi 0.9.1

psi-im psi 0.1.0

psi-im psi 0.9.3

psi-im psi

psi-im psi 0.11

psi-im psi 0.8.6

psi-im psi 0.9

psi-im psi 0.8.7

Vendor Advisories

Debian Bug report logs - #518468 CVE-2008-6393: possible DoS Package: psi; Maintainer for psi is Jan Niehusmann <jan@debianorg>; Source for psi is src:psi (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Fri, 6 Mar 2009 11:54:02 UTC Severity: important Tags: security Fixed in ...
Jesus Olmos Gonzalez discovered that an integer overflow in the PSI Jabber client may lead to remote denial of service The old stable distribution (etch) is not affected For the stable distribution (lenny), this problem has been fixed in version 011-9 For the unstable distribution (sid), this problem has been fixed in version 0121-1 We recom ...

Exploits

#!/usr/bin/python #psi jabber client 8010/tcp remote denial of service (win & lin) #by sha0[at]badchecksumnet #jolmosblogspotcom import socket, sys sock = socketsocket(socketAF_INET,socketSOCK_STREAM) try: sockconnect((sysargv[1],8010)) except: print 'Cannot connect!' sysexit(1) try: socksend('\x05\xff') ...