Vulnerability Description
Buffer overflow in raydium_network_read function in network.c in Raydium SVN revision 312 and earlier allows remote attackers to execute arbitrary code by sending packets with long global variables to the client.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Raydium | Raydium | svn_revision_283 |
References
- http://aluigi.altervista.org/adv/raydiumx-adv.txtVendor Advisory
- http://secunia.com/advisories/20097Vendor Advisory
- http://securityreason.com/securityalert/900
- http://www.securityfocus.com/archive/1/433930/100/0/threaded
- http://www.securityfocus.com/bid/17986
- http://www.vupen.com/english/advisories/2006/1808
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26516
- http://aluigi.altervista.org/adv/raydiumx-adv.txtVendor Advisory
- http://secunia.com/advisories/20097Vendor Advisory
- http://securityreason.com/securityalert/900
- http://www.securityfocus.com/archive/1/433930/100/0/threaded
- http://www.securityfocus.com/bid/17986
- http://www.vupen.com/english/advisories/2006/1808
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26516
FAQ
What is CVE-2006-2411?
CVE-2006-2411 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in raydium_network_read function in network.c in Raydium SVN revision 312 and earlier allows remote attackers to execute arbitrary code by sending packets with long global variables to...
How severe is CVE-2006-2411?
CVE-2006-2411 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2411?
Check the references section above for vendor advisories and patch information. Affected products include: Raydium Raydium.