CVE-2010-1147
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
06/04/2010
Last modified:
11/04/2025
Description
Stack-based buffer overflow in Open Direct Connect Hub (aka Open DC Hub or OpenDCHub) 0.8.1 allows remote authenticated users to execute arbitrary code via a long MyINFO message.
Impact
Base Score 2.0
6.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:roshan_singh:open_direct_connect_hub:0.8.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576308
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/040360.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/040380.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/040421.html
- http://marc.info/?l=oss-security&m=127051570728944&w=2
- http://openwall.com/lists/oss-security/2010/04/03/1
- http://secunia.com/advisories/39664
- http://www.indahax.com/exploits/opendchub-0-8-1-remote-code-execution-exploit#more-600
- http://www.securityfocus.com/archive/1/510428
- http://www.securityfocus.com/bid/39129
- http://www.vupen.com/english/advisories/2010/1023
- http://www.vupen.com/english/advisories/2010/1044
- https://bugzilla.redhat.com/show_bug.cgi?id=579206
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576308
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/040360.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/040380.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-April/040421.html
- http://marc.info/?l=oss-security&m=127051570728944&w=2
- http://openwall.com/lists/oss-security/2010/04/03/1
- http://secunia.com/advisories/39664
- http://www.indahax.com/exploits/opendchub-0-8-1-remote-code-execution-exploit#more-600
- http://www.securityfocus.com/archive/1/510428
- http://www.securityfocus.com/bid/39129
- http://www.vupen.com/english/advisories/2010/1023
- http://www.vupen.com/english/advisories/2010/1044
- https://bugzilla.redhat.com/show_bug.cgi?id=579206



