VYPR
Unrated severityNVD Advisory· Published Mar 28, 2026· Updated Mar 30, 2026

EKG Gadu 1.9 Local Buffer Overflow via Username Parameter

CVE-2016-20047

Description

EKG Gadu 1.9~pre+r2855-3+b1 contains a local buffer overflow vulnerability in the username handling that allows local attackers to execute arbitrary code by supplying an oversized username string. Attackers can trigger the overflow in the strlcpy function by passing a crafted buffer exceeding 258 bytes to overwrite the instruction pointer and execute shellcode with user privileges.

Affected products

2
  • Ekg/Ekgllm-fuzzy
    Range: = 1.9~pre+r2855-3+b1 (Debian package version 1.9~pre+r2855-3+b1)
  • ekg/EKG Gaduv5
    Range: 1:1.9~pre+r2855-3+b1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.