ID CVE-2006-3913
Summary Buffer overflow in Freeciv 2.1.0-beta1 and earlier, and SVN 15 Jul 2006 and earlier, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) negative chunk_length or a (2) large chunk->offset value in a PACKET_PLAYER_ATTRIBUTE_CHUNK packet in the generic_handle_player_attribute_chunk function in common/packets.c, and (3) a large packet->length value in the handle_unit_orders function in server/unithand.c.
References
Vulnerable Configurations
  • cpe:2.3:a:freeciv:freeciv:2.1.0_beta1:*:*:*:*:*:*:*
    cpe:2.3:a:freeciv:freeciv:2.1.0_beta1:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 17-10-2018 - 21:32)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 19117
bugtraq 20060723 Two crash vulnerabilities in Freeciv 2.1.0-beta1 (SVN 15 Jul 2006)
debian DSA-1142
mandriva MDKSA-2006:135
misc http://aluigi.altervista.org/adv/freecivx-adv.txt
secunia
  • 21171
  • 21254
  • 21352
sreason 1296
vupen ADV-2006-2942
xf
  • freeciv-packetsc-dos(27955)
  • freeciv-unithand-dos(27956)
Last major update 17-10-2018 - 21:32
Published 28-07-2006 - 00:04
Last modified 17-10-2018 - 21:32
Back to Top