Vulnerability Description
Format string vulnerability in the (1) Con_message and (2) conPrintf functions in con_main.c in Doomsday engine 1.8.6 allows remote attackers to execute arbitrary code via format string specifiers in an argument to the JOIN command, and possibly other command arguments.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Doomsday | Doomsday | 1.8.6 |
References
- http://aluigi.altervista.org/adv/doomsdayfs-adv.txtExploitVendor Advisory
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044865.html
- http://secunia.com/advisories/19515Vendor Advisory
- http://secunia.com/advisories/19519
- http://securitytracker.com/id?1015860
- http://www.gentoo.org/security/en/glsa/glsa-200604-05.xml
- http://www.securityfocus.com/archive/1/429857/100/0/threaded
- http://www.securityfocus.com/bid/17369
- http://www.vupen.com/english/advisories/2006/1221
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25622
- http://aluigi.altervista.org/adv/doomsdayfs-adv.txtExploitVendor Advisory
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044865.html
- http://secunia.com/advisories/19515Vendor Advisory
- http://secunia.com/advisories/19519
- http://securitytracker.com/id?1015860
FAQ
What is CVE-2006-1618?
CVE-2006-1618 is a vulnerability with a CVSS score of 7.5 (HIGH). Format string vulnerability in the (1) Con_message and (2) conPrintf functions in con_main.c in Doomsday engine 1.8.6 allows remote attackers to execute arbitrary code via format string specifiers in ...
How severe is CVE-2006-1618?
CVE-2006-1618 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1618?
Check the references section above for vendor advisories and patch information. Affected products include: Doomsday Doomsday.