Vulnerability Description
Francesco Stablum tcpick 0.2.1 allows remote attackers to cause a denial of service (segmentation fault) via certain fragmented packets, possibly involving invalid headers and an attacker-controlled payload length. NOTE: this issue might be a buffer overflow or overread.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Francesco Stablum | Tcpick | 0.2.1 |
References
- http://sourceforge.net/mailarchive/forum.php?thread_id=9989610&forum_id=37151
- http://www.securityfocus.com/bid/17665
- http://www.vupen.com/english/advisories/2006/1466
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26090
- http://sourceforge.net/mailarchive/forum.php?thread_id=9989610&forum_id=37151
- http://www.securityfocus.com/bid/17665
- http://www.vupen.com/english/advisories/2006/1466
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26090
FAQ
What is CVE-2006-0048?
CVE-2006-0048 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Francesco Stablum tcpick 0.2.1 allows remote attackers to cause a denial of service (segmentation fault) via certain fragmented packets, possibly involving invalid headers and an attacker-controlled p...
How severe is CVE-2006-0048?
CVE-2006-0048 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0048?
Check the references section above for vendor advisories and patch information. Affected products include: Francesco Stablum Tcpick.