Vigilance.fr - GNOME GLib: buffer overflow via SOCKS4_CONN_MSG_LEN, analyzed on 15/11/2024
An attacker can trigger a buffer overflow of GNOME GLib, via SOCKS4_CONN_MSG_LEN, in order to trigger a denial of service, and possibly to run code. - Security Vulnerability
An attacker can trigger a buffer overflow of GNOME GLib, via SOCKS4_CONN_MSG_LEN, in order to trigger a denial of service, and possibly to run code.
Quelle est votre réaction ?