First published: Mon Mar 19 2007(Updated: )
Multiple buffer overflows in Rhapsody IRC 0.28b allow remote attackers to execute arbitrary code via a (1) long command, (2) long server argument to the (a) connect or (b) server commands, (3) long nick argument to the (c) nick command, or a long (4) nick or (5) message argument to the (d) ctcp, (e) chat, (f) notice, (g) message (msg), or (h) query commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Rational Rhapsody | =0.28b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1502 has been classified as critical due to its potential for remote code execution.
CVE-2007-1502 affects Rhapsody IRC version 0.28b.
To fix CVE-2007-1502, upgrade to a version of Rhapsody IRC that is not vulnerable to this issue.
CVE-2007-1502 allows exploitation through multiple buffer overflows triggered by long command inputs.
Any user of Rhapsody IRC 0.28b can be affected by CVE-2007-1502, making them susceptible to remote attack.