Vulnerability Description
Buffer overflow in client/server Doom (csDoom) 0.7 and earlier allows remote attackers to (1) cause a denial of service via a long nickname or teamname to the SV_SetupUserInfo function or (2) execute arbitrary code via a long string sent when joining a match or a long chat message to the SV_BroadcastPrintf function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Csdoom | Csdoom | 2005_0.7 |
References
- http://aluigi.altervista.org/adv/csdoombof-adv.txtPatchVendor Advisory
- http://secunia.com/advisories/19389Vendor Advisory
- http://voxelsoft.com/csdoom/
- http://www.securityfocus.com/bid/17248ExploitPatch
- http://www.vupen.com/english/advisories/2006/1105
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25448
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25449
- http://aluigi.altervista.org/adv/csdoombof-adv.txtPatchVendor Advisory
- http://secunia.com/advisories/19389Vendor Advisory
- http://voxelsoft.com/csdoom/
- http://www.securityfocus.com/bid/17248ExploitPatch
- http://www.vupen.com/english/advisories/2006/1105
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25448
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25449
FAQ
What is CVE-2006-1402?
CVE-2006-1402 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in client/server Doom (csDoom) 0.7 and earlier allows remote attackers to (1) cause a denial of service via a long nickname or teamname to the SV_SetupUserInfo function or (2) execute ...
How severe is CVE-2006-1402?
CVE-2006-1402 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1402?
Check the references section above for vendor advisories and patch information. Affected products include: Csdoom Csdoom.