Integer signedness error in RenRen Talk 2.9 allows remote attackers to execute arbitrary code via crafted dimensions of a skin file, leading to a heap-based buffer overflow, as demonstrated using a BMP image.
References
Link | Resource |
---|---|
http://secunia.com/advisories/47314 | Vendor Advisory |
http://www.securityfocus.com/bid/51585 |
Configurations
History
No history.
Information
Published : 2012-01-24 18:55
Updated : 2012-01-25 05:00
NVD link : CVE-2012-0915
Mitre link : CVE-2012-0915
CVE.ORG link : CVE-2012-0915
JSON object : View
Products Affected
renren
- renren_talk
CWE
CWE-189
Numeric Errors