CVE-2006-2408

Multiple buffer overflows in Raydium before SVN revision 310 allow remote attackers to execute arbitrary code via a large packet when logged via (1) the raydium_log function in log.c or (2) the raydium_console_line_add function in console.c, possibly from a long player name.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:raydium:raydium:svn_revision_283:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_284:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_285:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_286:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_287:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_288:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_289:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_290:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_291:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_292:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_293:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_294:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_295:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_296:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_297:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_298:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_299:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_300:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_301:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_302:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_303:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_304:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_305:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_306:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_307:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_308:*:*:*:*:*:*:*
cpe:2.3:a:raydium:raydium:svn_revision_309:*:*:*:*:*:*:*

History

21 Nov 2024, 00:11

Type Values Removed Values Added
References () http://aluigi.altervista.org/adv/raydiumx-adv.txt - Vendor Advisory () http://aluigi.altervista.org/adv/raydiumx-adv.txt - Vendor Advisory
References () http://raydium.org/svn.php - () http://raydium.org/svn.php -
References () http://secunia.com/advisories/20097 - Vendor Advisory () http://secunia.com/advisories/20097 - Vendor Advisory
References () http://securityreason.com/securityalert/900 - () http://securityreason.com/securityalert/900 -
References () http://www.securityfocus.com/archive/1/433930/100/0/threaded - () http://www.securityfocus.com/archive/1/433930/100/0/threaded -
References () http://www.securityfocus.com/bid/17986 - () http://www.securityfocus.com/bid/17986 -
References () http://www.vupen.com/english/advisories/2006/1808 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/1808 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26510 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26510 -

Information

Published : 2006-05-16 10:02

Updated : 2024-11-21 00:11


NVD link : CVE-2006-2408

Mitre link : CVE-2006-2408

CVE.ORG link : CVE-2006-2408


JSON object : View

Products Affected

raydium

  • raydium
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer