Vulnerability Description
Array index error in tetrinet.c in gtetrinet 0.7.8 and earlier allows remote attackers to execute arbitrary code via a packet specifying a negative number of players, which is used as an array index.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gtetrinet | Gtetrinet | <= 0.7.8 |
References
- http://secunia.com/advisories/21691Vendor Advisory
- http://secunia.com/advisories/21704PatchVendor Advisory
- http://secunia.com/advisories/21749
- http://secunia.com/advisories/21800PatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200609-02.xmlPatch
- http://www.debian.org/security/2006/dsa-1163Patch
- http://www.novell.com/linux/security/advisories/2006_21_sr.html
- http://www.osvdb.org/28269
- http://www.securityfocus.com/bid/19766
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28683
- http://secunia.com/advisories/21691Vendor Advisory
- http://secunia.com/advisories/21704PatchVendor Advisory
- http://secunia.com/advisories/21749
- http://secunia.com/advisories/21800PatchVendor Advisory
- http://security.gentoo.org/glsa/glsa-200609-02.xmlPatch
FAQ
What is CVE-2006-3125?
CVE-2006-3125 is a vulnerability with a CVSS score of 7.5 (HIGH). Array index error in tetrinet.c in gtetrinet 0.7.8 and earlier allows remote attackers to execute arbitrary code via a packet specifying a negative number of players, which is used as an array index.
How severe is CVE-2006-3125?
CVE-2006-3125 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3125?
Check the references section above for vendor advisories and patch information. Affected products include: Gtetrinet Gtetrinet.