Buffer overflow in raydium_network_read function in network.c in Raydium SVN revision 312 and earlier allows remote attackers to execute arbitrary code by sending packets with long global variables to the client.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://aluigi.altervista.org/adv/raydiumx-adv.txt - Vendor Advisory | |
References | () http://secunia.com/advisories/20097 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/900 - | |
References | () http://www.securityfocus.com/archive/1/433930/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/17986 - | |
References | () http://www.vupen.com/english/advisories/2006/1808 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/26516 - |
Information
Published : 2006-05-16 10:02
Updated : 2024-11-21 00:11
NVD link : CVE-2006-2411
Mitre link : CVE-2006-2411
CVE.ORG link : CVE-2006-2411
JSON object : View
Products Affected
raydium
- raydium
CWE