Buffer overflow in pl_main.c in sail in BSDgames before 2.17-7 allows local users to execute arbitrary code via a long player name that is used in a scanf function call.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=360989 - | |
References | () http://secunia.com/advisories/19687 - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/736 - | |
References | () http://www.debian.org/security/2006/dsa-1036 - Patch, Vendor Advisory | |
References | () http://www.osvdb.org/24634 - Patch | |
References | () http://www.pulltheplug.org/fu/?q=node/56 - | |
References | () http://www.securityfocus.com/bid/17401 - |
Information
Published : 2006-04-12 22:02
Updated : 2025-04-03 01:03
NVD link : CVE-2006-1744
Mitre link : CVE-2006-1744
CVE.ORG link : CVE-2006-1744
JSON object : View
Products Affected
joey_hess
- bsdgames
CWE