EKG Gadu 1.9~pre+r2855-3+b1 contains a local buffer overflow vulnerability in the username handling that allows local attackers to execute arbitrary code by supplying an oversized username string. Attackers can trigger the overflow in the strlcpy function by passing a crafted buffer exceeding 258 bytes to overwrite the instruction pointer and execute shellcode with user privileges.
History

Mon, 30 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Ekg
Ekg ekg Gadu
Vendors & Products Ekg
Ekg ekg Gadu

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description EKG Gadu 1.9~pre+r2855-3+b1 contains a local buffer overflow vulnerability in the username handling that allows local attackers to execute arbitrary code by supplying an oversized username string. Attackers can trigger the overflow in the strlcpy function by passing a crafted buffer exceeding 258 bytes to overwrite the instruction pointer and execute shellcode with user privileges.
Title EKG Gadu 1.9 Local Buffer Overflow via Username Parameter
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-03-28T11:58:07.645Z

Updated: 2026-03-30T17:30:50.428Z

Reserved: 2026-03-28T11:40:17.377Z

Link: CVE-2016-20047

cve-icon Vulnrichment

Updated: 2026-03-30T17:30:35.847Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-28T12:16:01.013

Modified: 2026-03-30T13:26:07.647

Link: CVE-2016-20047

cve-icon Redhat

No data.