CVE-2006-4006

The do_gameinfo function in BomberClone 0.11.6 and earlier, and possibly other functions, does not reset the packet data size, which causes the send_pkg function (packets.c) to use this data size when sending a reply, and allows remote attackers to read portions of server memory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bomberclone:bomberclone:*:*:*:*:*:*:*:*
cpe:2.3:a:bomberclone:bomberclone:0.11.3:*:*:*:*:*:*:*
cpe:2.3:a:bomberclone:bomberclone:0.11.4:*:*:*:*:*:*:*
cpe:2.3:a:bomberclone:bomberclone:0.11.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:14

Type Values Removed Values Added
References () http://aluigi.altervista.org/adv/bcloneboom-adv.txt - Exploit, Vendor Advisory () http://aluigi.altervista.org/adv/bcloneboom-adv.txt - Exploit, Vendor Advisory
References () http://aluigi.org/poc/bcloneboom.zip - Exploit () http://aluigi.org/poc/bcloneboom.zip - Exploit
References () http://secunia.com/advisories/21303 - Vendor Advisory () http://secunia.com/advisories/21303 - Vendor Advisory
References () http://secunia.com/advisories/21985 - Vendor Advisory () http://secunia.com/advisories/21985 - Vendor Advisory
References () http://www.debian.org/security/2006/dsa-1180 - () http://www.debian.org/security/2006/dsa-1180 -
References () http://www.osvdb.org/27648 - () http://www.osvdb.org/27648 -
References () http://www.securityfocus.com/bid/19255 - Exploit () http://www.securityfocus.com/bid/19255 - Exploit
References () http://www.vupen.com/english/advisories/2006/3067 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3067 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28092 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28092 -

Information

Published : 2006-08-07 19:04

Updated : 2024-11-21 00:14


NVD link : CVE-2006-4006

Mitre link : CVE-2006-4006

CVE.ORG link : CVE-2006-4006


JSON object : View

Products Affected

bomberclone

  • bomberclone
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor