{ "schema_version": "1.4.0", "id": "GHSA-c5xx-mwc6-vw82", "modified": "2025-04-09T04:18:08Z", "published": "2022-05-02T03:47:11Z", "aliases": [ "CVE-2009-3637" ], "details": "Stack-based buffer overflow in the M_AddToServerList function in client/menu.c in Red Planet Arena Alien Arena 7.30 allows remote attackers to execute arbitrary code via a packet with a crafted server description to UDP port 27901 followed by a packet with a long print command.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3637" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00179.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00218.html" }, { "type": "WEB", "url": "http://icculus.org/alienarena/changelogs/7.31.txt" }, { "type": "WEB", "url": "http://secunia.com/advisories/37118" }, { "type": "WEB", "url": "http://secunia.com/advisories/37256" }, { "type": "WEB", "url": "http://secunia.com/advisories/37259" }, { "type": "WEB", "url": "http://www.ngssoftware.com/advisories/very-high-risk-vulnerability-in-alien-arena-730" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/507369/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/36782" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/2997" } ], "database_specific": { "cwe_ids": [ "CWE-119" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-01-13T11:30:00Z" } }