Vulnerability Details : CVE-2011-5129
Heap-based buffer overflow in XChat 2.8.9 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long response string.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2011-5129
Probability of exploitation activity in the next 30 days: 84.55%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-5129
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2011-5129
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-5129
-
http://packetstormsecurity.org/files/107312/xchat-dos.txt
XChat 2.8.9 Heap Overflow ≈ Packet StormExploit
-
http://www.securitytracker.com/id?1027468
XChat Heap Overflow Lets Remote Users Deny Service - SecurityTracker
-
http://www.securityfocus.com/bid/50820
XChat Remote Denial of Service VulnerabilityExploit
-
http://www.exploit-db.com/exploits/18159
XChat 2.8.9 - Heap Overflow Denial of Service - Linux dos ExploitExploit
Products affected by CVE-2011-5129
- cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.8.9:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:1.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.7:a:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.7:f:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.5:e:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.5:b:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.7:e:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.7:d:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.3:e:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.7b:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.7:c:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.7:b:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.3:c:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:xchat:xchat:2.6.7:*:*:*:*:*:*:*