Format string vulnerability in the raydium_log function in console.c in Raydium before SVN revision 310 allows local users to execute arbitrary code via format string specifiers in the format parameter, which are not properly handled in a call to raydium_console_line_add.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/raydiumx-adv.txt - Vendor Advisory | |
References | () http://raydium.org/svn.php - | |
References | () http://secunia.com/advisories/20097 - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/900 - | |
References | () http://www.securityfocus.com/archive/1/433930/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17986 - | |
References | () http://www.vupen.com/english/advisories/2006/1808 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26514 - |
Information
Published : 2006-05-16 10:02
Updated : 2024-11-21 00:11
NVD link : CVE-2006-2409
Mitre link : CVE-2006-2409
CVE.ORG link : CVE-2006-2409
JSON object : View
Products Affected
raydium
- raydium
CWE
CWE-134
Use of Externally-Controlled Format String