Description
Multiple buffer overflows in Doomsday (aka deng) 1.9.0-beta5.1 and earlier allow remote attackers to execute arbitrary code via a long chat (PKT_CHAT) message that is not properly handled by the (1) D_NetPlayerEvent function in d_net.c or the (2) Msg_Write function in net_msg.c, or (3) many commands that are not properly handled by the NetSv_ReadCommands function in d_netsv.c; or (4) cause a denial of service (daemon crash) via a chat (PKT_CHAT) message without a final '\0' character.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Luigi Auriemma · textremotelinux
https://www.exploit-db.com/exploits/30543
References (12)
Core 12
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36332
Exploit x_refsource_misc
http://aluigi.altervista.org/adv/dumsdei-adv.txt
Issue Tracking x_refsource_confirm
http://bugs.gentoo.org/show_bug.cgi?id=190835
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/26524
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36333
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3084
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28821
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/478077/100/0/threaded
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/25483
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200802-02.xml
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/36334
Exploit x_refsource_misc
http://aluigi.org/poc/dumsdei.zip
Scores
EPSS
0.2988
EPSS Percentile
96.7%
Details
CWE
CWE-119
Status
published
Products (1)
doomsday/doomsday
< 1.9.0_beta5.1
Published
Aug 31, 2007
Tracked Since
Feb 18, 2026