First published: Fri Feb 21 2020(Updated: )
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BMP).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xchat | ||
GTK | =2.10.4 | |
GTK | =2.14.7 | |
GTK | =2.18.9 | |
GTK | =2.24.7 | |
XChat | <2.8.6 | |
XChat | <1499-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0828 has a medium severity rating due to its potential to cause denial of service or remote code execution.
To mitigate CVE-2012-0828, you should upgrade Xchat-WDK to version 1499-4 or later.
CVE-2012-0828 affects Xchat versions prior to 2.8.6 and all versions of Xchat-WDK before 1499-4.
Yes, CVE-2012-0828 also affects GTK versions that are compatible with the vulnerable Xchat-WDK.
The impacts of CVE-2012-0828 include crashing the Xchat client or executing arbitrary code if exploited by an attacker.