The application is prone to a stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied
data. Specifically, this issue occurs when the application creates a
'Connecting' log message. An attacker can exploit this issue by enticing
a vulnerable user into connecting to a malicious HTTP server or opening a
specially crafted URI that contains an excessively long hostname.
data. Specifically, this issue occurs when the application creates a
'Connecting' log message. An attacker can exploit this issue by enticing
a vulnerable user into connecting to a malicious HTTP server or opening a
specially crafted URI that contains an excessively long hostname.
CVE Link
Exploit Type - Old
Exploits/Client Side
Exploit Platform
Exploit Type
Product Name