CVE-2007-4642

Doomsday 1.9.0-beta5.1 - Buffer Overflow

Title source: llm
STIX 2.1

Description

Multiple buffer overflows in Doomsday (aka deng) 1.9.0-beta5.1 and earlier allow remote attackers to execute arbitrary code via a long chat (PKT_CHAT) message that is not properly handled by the (1) D_NetPlayerEvent function in d_net.c or the (2) Msg_Write function in net_msg.c, or (3) many commands that are not properly handled by the NetSv_ReadCommands function in d_netsv.c; or (4) cause a denial of service (daemon crash) via a chat (PKT_CHAT) message without a final '\0' character.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Luigi Auriemma · textremotelinux
https://www.exploit-db.com/exploits/30543

References (12)

Core 12
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36332
Issue Tracking x_refsource_confirm
http://bugs.gentoo.org/show_bug.cgi?id=190835
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/26524
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36333
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3084
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/28821
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/478077/100/0/threaded
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/25483
Third Party Advisory vendor-advisory x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200802-02.xml
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36334
Exploit x_refsource_misc
http://aluigi.org/poc/dumsdei.zip

Scores

EPSS 0.2988
EPSS Percentile 96.7%

Details

CWE
CWE-119
Status published
Products (1)
doomsday/doomsday < 1.9.0_beta5.1
Published Aug 31, 2007
Tracked Since Feb 18, 2026