Integer signedness error in RenRen Talk 2.9 allows remote attackers to execute arbitrary code via crafted dimensions of a skin file, leading to a heap-based buffer overflow, as demonstrated using a BMP image.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/51585 | |
http://secunia.com/advisories/47314 | Vendor Advisory |
Configurations
Information
Published : 2012-01-24 10:55
Updated : 2012-01-24 21:00
NVD link : CVE-2012-0915
Mitre link : CVE-2012-0915
JSON object : View
CWE
CWE-189
Numeric Errors
Products Affected
renren
- renren_talk