paul Posted July 15, 2006 Report Share Posted July 15, 2006 Stack-based buffer overflow in MiMMS 0.0.9 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via the (1) send_command, (2) string_utf16, (3) get_data, and (4) get_media_packet functions, and possibly other functions. Libmms uses the same vulnerable code. Update: The previous update for libmms had an incorrect/incomplete patch. This update includes a more complete fix for the issue. Link to comment Share on other sites More sharing options...
Recommended Posts