CVE-2006-1618

Format string vulnerability in the (1) Con_message and (2) conPrintf functions in con_main.c in Doomsday engine 1.8.6 allows remote attackers to execute arbitrary code via format string specifiers in an argument to the JOIN command, and possibly other command arguments.
Configurations

Configuration 1 (hide)

cpe:2.3:a:doomsday:doomsday:1.8.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:09

Type Values Removed Values Added
References () http://aluigi.altervista.org/adv/doomsdayfs-adv.txt - Exploit, Vendor Advisory () http://aluigi.altervista.org/adv/doomsdayfs-adv.txt - Exploit, Vendor Advisory
References () http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044865.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044865.html -
References () http://secunia.com/advisories/19515 - Vendor Advisory () http://secunia.com/advisories/19515 - Vendor Advisory
References () http://secunia.com/advisories/19519 - () http://secunia.com/advisories/19519 -
References () http://securitytracker.com/id?1015860 - () http://securitytracker.com/id?1015860 -
References () http://www.gentoo.org/security/en/glsa/glsa-200604-05.xml - () http://www.gentoo.org/security/en/glsa/glsa-200604-05.xml -
References () http://www.securityfocus.com/archive/1/429857/100/0/threaded - () http://www.securityfocus.com/archive/1/429857/100/0/threaded -
References () http://www.securityfocus.com/bid/17369 - () http://www.securityfocus.com/bid/17369 -
References () http://www.vupen.com/english/advisories/2006/1221 - () http://www.vupen.com/english/advisories/2006/1221 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25622 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25622 -

Information

Published : 2006-04-05 10:04

Updated : 2024-11-21 00:09


NVD link : CVE-2006-1618

Mitre link : CVE-2006-1618

CVE.ORG link : CVE-2006-1618


JSON object : View

Products Affected

doomsday

  • doomsday