A vulnerability, which was classified as critical, was found in ayttm up to 0.5.0.89. This affects the function http_connect in the library libproxy/proxy.c. The manipulation leads to format string. It is possible to initiate the attack remotely. The name of the patch is 40e04680018614a7d2b68566b261b061a0597046. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-222267.
References
Link | Resource |
---|---|
https://sourceforge.net/p/ayttm/mailman/message/34397158/ | Third Party Advisory |
https://github.com/ayttm/ayttm/commit/40e04680018614a7d2b68566b261b061a0597046 | Patch Third Party Advisory |
https://vuldb.com/?ctiid.222267 | Permissions Required |
https://vuldb.com/?id.222267 | Third Party Advisory |
Configurations
Information
Published : 2023-03-04 21:15
Updated : 2023-03-13 09:55
NVD link : CVE-2015-10088
Mitre link : CVE-2015-10088
JSON object : View
CWE
CWE-134
Use of Externally-Controlled Format String
Products Affected
ayttm_project
- ayttm