CVE-2006-4127

Multiple format string vulnerabilities in DConnect Daemon 0.7.0 and earlier allow remote administrators to execute arbitrary code via format string specifiers that are not properly handled when calling the (1) privmsg() or (2) pubmsg functions from (a) cmd.user.c, (b) penalties.c, or (c) cmd.dc.c.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dconnect:dconnect_daemon:0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:dconnect:dconnect_daemon:0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:dconnect:dconnect_daemon:0.7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:15

Type Values Removed Values Added
References () http://secunia.com/advisories/21384 - Vendor Advisory () http://secunia.com/advisories/21384 - Vendor Advisory
References () http://securityreason.com/securityalert/1377 - () http://securityreason.com/securityalert/1377 -
References () http://securitytracker.com/id?1016641 - Exploit () http://securitytracker.com/id?1016641 - Exploit
References () http://www.dc.ds.pg.gda.pl/ - Patch () http://www.dc.ds.pg.gda.pl/ - Patch
References () http://www.dc.ds.pg.gda.pl/?page=doc&doc=changelog - () http://www.dc.ds.pg.gda.pl/?page=doc&doc=changelog -
References () http://www.securityfocus.com/archive/1/442440/100/0/threaded - () http://www.securityfocus.com/archive/1/442440/100/0/threaded -
References () http://www.securityfocus.com/bid/19371 - Exploit, Patch () http://www.securityfocus.com/bid/19371 - Exploit, Patch
References () http://www.vupen.com/english/advisories/2006/3181 - () http://www.vupen.com/english/advisories/2006/3181 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28280 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28280 -

Information

Published : 2006-08-14 23:04

Updated : 2025-04-03 01:03


NVD link : CVE-2006-4127

Mitre link : CVE-2006-4127

CVE.ORG link : CVE-2006-4127


JSON object : View

Products Affected

dconnect

  • dconnect_daemon