CVE-2008-5279

N/A Unknown
Published: November 29, 2008 Modified: April 23, 2026
View on NVD

Description

The Local ZIM Server (zcs.exe) in Zilab Chat and Instant Messaging (ZIM) Server 2.1 and earlier allow remote attackers to execute arbitrary code via (1) heap-based buffer overflows involving multiple vectors including a long room name and a long source account, and (2) a stack-based buffer overflow with a long username in an information request. NOTE: some of these details are obtained from third party information.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://aluigi.org/poc/zilabzcsx.zip
Source: cve@mitre.org
Exploit
http://secunia.com/advisories/29062
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/27940
Source: cve@mitre.org
Exploit
http://aluigi.altervista.org/adv/zilabzcsx-adv.txt
Source: af854a3a-2127-422b-91ae-364da2661108
http://aluigi.org/poc/zilabzcsx.zip
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/29062
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/27940
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.vupen.com/english/advisories/2008/0664
Source: af854a3a-2127-422b-91ae-364da2661108

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
5.9%
91th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

zilab