Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:raven_software:soldier_of_fortune_2:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B80C05C-6B35-4B6C-990F-90032343BBD4", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:a:punkbuster:punkbuster:*:*:*:*:*:*:*:*", "matchCriteriaId": "764E954C-374A-4947-B161-FD70101CF60F", "versionEndIncluding": "1.728", "vulnerable": true}, {"criteria": "cpe:2.3:a:punkbuster:punkbuster:1.272:*:*:*:*:*:*:*", "matchCriteriaId": "2D3F9AE0-21BA-46EF-9478-69FB9CCABF69", "vulnerable": true}, {"criteria": "cpe:2.3:a:punkbuster:punkbuster:1.457:*:*:*:*:*:*:*", "matchCriteriaId": "B1056D82-5F58-4995-A3ED-8C2DF9E28BDE", "vulnerable": true}, {"criteria": "cpe:2.3:a:punkbuster:punkbuster:1.458:*:*:*:*:*:*:*", "matchCriteriaId": "98AF72B7-746E-4D41-9F80-5F54A9ACBCDF", "vulnerable": true}, {"criteria": "cpe:2.3:a:punkbuster:punkbuster:1.641:*:*:*:*:*:*:*", "matchCriteriaId": "59F0238D-A80E-4B2F-99BB-76053AFE313E", "vulnerable": true}, {"criteria": "cpe:2.3:a:punkbuster:punkbuster:1.642:*:*:*:*:*:*:*", "matchCriteriaId": "C3E1E82C-6001-49A2-AF1D-9436F00109DE", "vulnerable": true}, {"criteria": "cpe:2.3:a:punkbuster:punkbuster:1.718:*:*:*:*:*:*:*", "matchCriteriaId": "BBFCE4B0-699E-401C-B40D-38E240DCA9FA", "vulnerable": true}, {"criteria": "cpe:2.3:a:punkbuster:punkbuster:1.723:*:*:*:*:*:*:*", "matchCriteriaId": "0BE4C80D-994E-48EF-A8BA-8D62B808628B", "vulnerable": true}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Buffer overflow in pbsv.dll, as used in Soldier of Fortune II and possibly other applications when Even Balance PunkBuster 1.728 or earlier is enabled, allows remote attackers to cause a denial of service (application server crash) and possibly execute arbitrary code via a long restart packet."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer en pbsv.dll usado en Soldier of Fortune II y posiblemente en otras aplicaciones cuando Even Balance PunkBuster v1.728 o versiones previas est\u00e1 activado, permite a atacantes remotos provocar una dengaci\u00f3n de servicio (ca\u00edda del servidor de la aplicaci\u00f3n) y posiblemente la ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un paquete largo \"restart\"."}], "id": "CVE-2009-3924", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2009-11-10T02:30:00.267", "references": [{"source": "cve@mitre.org", "url": "http://aluigi.altervista.org/adv/sof2pbbof-adv.txt"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://aluigi.org/poc/sof2pbbof.zip"}, {"source": "cve@mitre.org", "url": "http://secunia.com/advisories/36221"}, {"source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52400"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://aluigi.altervista.org/adv/sof2pbbof-adv.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://aluigi.org/poc/sof2pbbof.zip"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/36221"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52400"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}