Vigilance.fr - GNOME GLib: buffer overflow via SOCKS4_CONN_MSG_LEN, analyzed on 15/11/2024

An attacker can trigger a buffer overflow of GNOME GLib, via SOCKS4_CONN_MSG_LEN, in order to trigger a denial of service, and possibly to run code. - Security Vulnerability

Jan 15, 2025 - 16:30
 0
Vigilance.fr - GNOME GLib: buffer overflow via SOCKS4_CONN_MSG_LEN, analyzed on 15/11/2024

An attacker can trigger a buffer overflow of GNOME GLib, via SOCKS4_CONN_MSG_LEN, in order to trigger a denial of service, and possibly to run code.

Quelle est votre réaction ?

like

dislike

love

funny

angry

sad

wow