ID CVE-2004-1892
Summary Stack-based buffer overflow in DecodeBase16 function, as used in the (1) IRC module and (2) web server in eMule 0.42d, allows remote attackers to execute arbitrary code via a long string.
References
Vulnerable Configurations
  • cpe:2.3:a:emule:emule:0.42d
    cpe:2.3:a:emule:emule:0.42d
CVSS
Base: 7.5 (as of 27-05-2005 - 09:24)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
exploit-db via4
description eMule. CVE-2004-1892. Remote exploit for windows platform
id EDB-ID:175
last seen 2016-01-31
modified 2004-04-12
published 2004-04-12
reporter kingcope
source https://www.exploit-db.com/download/175/
title eMule <= 0.42d IRC Remote Buffer Overflow Exploit
nessus via4
NASL family Peer-To-Peer File Sharing
NASL id EMULE_HTTP_FLAWS.NASL
description According to its version, the eMule Web Server listening on this port contains a buffer overflow vulnerability in the 'DecodeBase16' function due to a lack of length checks on its inputs. An anonymous remote attacker may be able to leverage this issue to execute arbitrary code on the affected host.
last seen 2019-02-21
modified 2018-11-15
plugin id 42833
published 2009-11-17
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=42833
title eMule IRC Module / Web Server DecodeBase16 Function Remote Overflow
refmap via4
bid 10039
bugtraq 20040403 eMule v0.42d Buffer Overflow
confirm http://www.emule-project.net/home/perl/news.cgi?l=1&cat_id=22
secunia 11289
xf emule-decodebase16-bo(15730)
Last major update 17-10-2016 - 23:02
Published 31-12-2004 - 00:00
Last modified 10-07-2017 - 21:31
Back to Top