Array index error in tetrinet.c in gtetrinet 0.7.8 and earlier allows remote attackers to execute arbitrary code via a packet specifying a negative number of players, which is used as an array index.
References
Configurations
History
21 Nov 2024, 00:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21691 - Vendor Advisory | |
References | () http://secunia.com/advisories/21704 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/21749 - | |
References | () http://secunia.com/advisories/21800 - Patch, Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200609-02.xml - Patch | |
References | () http://www.debian.org/security/2006/dsa-1163 - Patch | |
References | () http://www.novell.com/linux/security/advisories/2006_21_sr.html - | |
References | () http://www.osvdb.org/28269 - | |
References | () http://www.securityfocus.com/bid/19766 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28683 - |
Information
Published : 2006-08-31 21:04
Updated : 2025-04-03 01:03
NVD link : CVE-2006-3125
Mitre link : CVE-2006-3125
CVE.ORG link : CVE-2006-3125
JSON object : View
Products Affected
gtetrinet
- gtetrinet
CWE