Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 17 Sep 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:rathena:rathena:*:*:*:*:*:*:*:* |
Fri, 12 Sep 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rathena
Rathena rathena |
|
| Vendors & Products |
Rathena
Rathena rathena |
Wed, 10 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Sep 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 2f5248b have a heap-based buffer overflow in the login server, remote attacker to overwrite adjacent session fields by sending a crafted `CA_SSO_LOGIN_REQ` with an oversized token length. This leads to immediate denial of service (crash) and it is possible to achieve remote code execution via heap corruption. Commit 2f5248b fixes the issue. | |
| Title | rAthena has heap-based buffer overflow in login server | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-10T19:30:07.516Z
Reserved: 2025-09-01T20:03:06.533Z
Link: CVE-2025-58447
Updated: 2025-09-10T19:30:03.478Z
Status : Analyzed
Published: 2025-09-09T23:15:36.497
Modified: 2025-09-17T20:53:21.610
Link: CVE-2025-58447
No data.
OpenCVE Enrichment
Updated: 2025-09-12T09:11:40Z