CVE-2008-6393

Psi < 0.12 - Numeric Error

Title source: rule
STIX 2.1

Description

PSI Jabber client before 0.12.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a file transfer request with a negative value in a SOCKS5 option, which bypasses a signed integer check and triggers an integer overflow and a heap-based buffer overflow.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Sha0 · pythondosmultiple
https://www.exploit-db.com/exploits/7555

References (14)

Core 14
Core References
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/34259
Exploit x_refsource_confirm
http://bugs.gentoo.org/show_bug.cgi?id=252830
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/34301
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7555
Exploit mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/499563
Exploit mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2009/02/25/5
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33311
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2009/dsa-1741
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/34119

Scores

EPSS 0.2314
EPSS Percentile 96.0%

Details

CWE
CWE-189
Status published
Products (9)
psi-im/psi 0.1.0
psi-im/psi 0.8.6
psi-im/psi 0.8.7
psi-im/psi 0.9
psi-im/psi 0.9.1
psi-im/psi 0.9.2
psi-im/psi 0.9.3
psi-im/psi 0.11
psi-im/psi < 0.12
Published Mar 03, 2009
Tracked Since Feb 18, 2026