HIGH · 7.5

CVE-2006-1592

Buffer overflow in the is_client_wad_ok function in w_wad.cpp for (1) Zdaemon 1.08.01 and (2) X-Doom allows remote attackers to execute arbitrary code via a long filename argument.

Vulnerability Description

Buffer overflow in the is_client_wad_ok function in w_wad.cpp for (1) Zdaemon 1.08.01 and (2) X-Doom allows remote attackers to execute arbitrary code via a long filename argument.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
X-DoomX-Doom1.06.07
ZdaemonZdaemon1.08.01

References

FAQ

What is CVE-2006-1592?

CVE-2006-1592 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the is_client_wad_ok function in w_wad.cpp for (1) Zdaemon 1.08.01 and (2) X-Doom allows remote attackers to execute arbitrary code via a long filename argument.

How severe is CVE-2006-1592?

CVE-2006-1592 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2006-1592?

Check the references section above for vendor advisories and patch information. Affected products include: X-Doom X-Doom, Zdaemon Zdaemon.