ID CVE-2006-2412
Summary The raydium_network_read function in network.c in Raydium SVN revision 312 and earlier allows remote attackers to cause a denial of service (application crash) via a large ID, which causes an invalid memory access (buffer over-read).
References
Vulnerable Configurations
  • cpe:2.3:a:raydium:raydium:svn_revision_283:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_283:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_284:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_284:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_285:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_285:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_286:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_286:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_287:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_287:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_288:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_288:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_289:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_289:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_290:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_290:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_291:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_291:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_292:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_292:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_293:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_293:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_294:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_294:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_295:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_295:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_296:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_296:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_297:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_297:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_298:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_298:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_299:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_299:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_300:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_300:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_301:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_301:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_302:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_302:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_303:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_303:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_304:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_304:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_305:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_305:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_306:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_306:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_307:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_307:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_308:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_308:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_309:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_309:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_310:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_310:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_311:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_311:*:*:*:*:*:*:*
  • cpe:2.3:a:raydium:raydium:svn_revision_312:*:*:*:*:*:*:*
    cpe:2.3:a:raydium:raydium:svn_revision_312:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 18-10-2018 - 16:39)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 17986
bugtraq 20060512 Multiple vulnerabilities in Raydium rev 309
misc http://aluigi.altervista.org/adv/raydiumx-adv.txt
secunia 20097
sreason 900
vupen ADV-2006-1808
xf raydium-raydiumnetworkread-bo(26516)
Last major update 18-10-2018 - 16:39
Published 16-05-2006 - 10:02
Last modified 18-10-2018 - 16:39
Back to Top