---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: Vavoom Multiple Vulnerabilities SECUNIA ADVISORY ID: SA26554 VERIFY ADVISORY: http://secunia.com/advisories/26554/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: Vavoom 1.x http://secunia.com/product/8925/ DESCRIPTION: Luigi Auriemma has reported some vulnerabilities in Vavoom, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. 1) A format string error exists within the "SAY" command in sv_main.cpp. This can be exploited to crash the server or potentially execute arbitrary code by sending a specially crafted chat message containing format specifiers. 2) A boundary error exists within the "VThinker::BroadcastPrintf()" function in p_thinker.cpp. This can be exploited to cause a buffer overflow by sending an overly long chat message. Successful exploitation may allow the execution of arbitrary code. 3) An assertion error exists within the "VStr::Resize()" function in str.cpp. This can be exploited to crash a server by e.g. sending a specially crafted UDP datagram to the server (default port 26000). SOLUTION: Use in trusted network environments only. PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/vaboom2-adv.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------