ID CVE-2006-2023
Summary Integer overflow in the RTSP_msg_len function in rtsp/RTSP_msg_len.c in Fenice 1.10 and earlier allows remote attackers to cause a denial of service (application crash) via a large HTTP Content-Length value, which leads to an invalid memory access.
References
Vulnerable Configurations
  • cpe:2.3:a:ls3:fenice:*:*:*:*:*:*:*:*
    cpe:2.3:a:ls3:fenice:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 18-10-2018 - 16:37)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 17678
bugtraq
  • 20060423 Buffer-overflow and crash in Fenice OMS 1.10
  • 20060607 Re: Buffer-overflow and crash in Fenice OMS 1.10
misc http://aluigi.altervista.org/adv/fenicex-adv.txt
osvdb 24882
secunia 19770
sreason 794
vupen ADV-2006-1491
xf fenice-contentlength-dos(26080)
Last major update 18-10-2018 - 16:37
Published 25-04-2006 - 20:06
Last modified 18-10-2018 - 16:37
Back to Top