ID CVE-2006-1592
Summary Buffer overflow in the is_client_wad_ok function in w_wad.cpp for (1) Zdaemon 1.08.01 and (2) X-Doom allows remote attackers to execute arbitrary code via a long filename argument.
References
Vulnerable Configurations
  • cpe:2.3:a:x-doom:x-doom:1.06.07:*:*:*:*:*:*:*
    cpe:2.3:a:x-doom:x-doom:1.06.07:*:*:*:*:*:*:*
  • cpe:2.3:a:zdaemon:zdaemon:1.08.01:*:*:*:*:*:*:*
    cpe:2.3:a:zdaemon:zdaemon:1.08.01:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 18-10-2018 - 16:33)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 17340
bugtraq 20060331 Buffer-overflow and in-game crash in Zdaemon 1.08.01
fulldisc 20060331 Buffer-overflow and in-game crash in Zdaemon 1.08.01
misc http://aluigi.altervista.org/adv/zdaebof-adv.txt
secunia
  • 19496
  • 19509
vupen
  • ADV-2006-1198
  • ADV-2006-1199
xf zdaemon-isclientwadok-bo(25592)
Last major update 18-10-2018 - 16:33
Published 03-04-2006 - 10:04
Last modified 18-10-2018 - 16:33
Back to Top