ID |
CVE-2006-3913
|
Summary |
Buffer overflow in Freeciv 2.1.0-beta1 and earlier, and SVN 15 Jul 2006 and earlier, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a (1) negative chunk_length or a (2) large chunk->offset value in a PACKET_PLAYER_ATTRIBUTE_CHUNK packet in the generic_handle_player_attribute_chunk function in common/packets.c, and (3) a large packet->length value in the handle_unit_orders function in server/unithand.c. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 7.5 (as of 17-10-2018 - 21:32) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
refmap
via4
|
bid | 19117 | bugtraq | 20060723 Two crash vulnerabilities in Freeciv 2.1.0-beta1 (SVN 15 Jul 2006) | debian | DSA-1142 | mandriva | MDKSA-2006:135 | misc | http://aluigi.altervista.org/adv/freecivx-adv.txt | secunia | | sreason | 1296 | vupen | ADV-2006-2942 | xf | - freeciv-packetsc-dos(27955)
- freeciv-unithand-dos(27956)
|
|
Last major update |
17-10-2018 - 21:32 |
Published |
28-07-2006 - 00:04 |
Last modified |
17-10-2018 - 21:32 |