CVE-2006-0048

Francesco Stablum tcpick 0.2.1 allows remote attackers to cause a denial of service (segmentation fault) via certain fragmented packets, possibly involving invalid headers and an attacker-controlled payload length. NOTE: this issue might be a buffer overflow or overread.
Configurations

Configuration 1 (hide)

cpe:2.3:a:francesco_stablum:tcpick:0.2.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:05

Type Values Removed Values Added
References () http://sourceforge.net/mailarchive/forum.php?thread_id=9989610&forum_id=37151 - () http://sourceforge.net/mailarchive/forum.php?thread_id=9989610&forum_id=37151 -
References () http://www.securityfocus.com/bid/17665 - () http://www.securityfocus.com/bid/17665 -
References () http://www.vupen.com/english/advisories/2006/1466 - () http://www.vupen.com/english/advisories/2006/1466 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26090 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26090 -

Information

Published : 2006-04-26 00:06

Updated : 2024-11-21 00:05


NVD link : CVE-2006-0048

Mitre link : CVE-2006-0048

CVE.ORG link : CVE-2006-0048


JSON object : View

Products Affected

francesco_stablum

  • tcpick