Multiple format string vulnerabilities in DConnect Daemon 0.7.0 and earlier allow remote administrators to execute arbitrary code via format string specifiers that are not properly handled when calling the (1) privmsg() or (2) pubmsg functions from (a) cmd.user.c, (b) penalties.c, or (c) cmd.dc.c.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21384 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/1377 - | |
References | () http://securitytracker.com/id?1016641 - Exploit | |
References | () http://www.dc.ds.pg.gda.pl/ - Patch | |
References | () http://www.dc.ds.pg.gda.pl/?page=doc&doc=changelog - | |
References | () http://www.securityfocus.com/archive/1/442440/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/19371 - Exploit, Patch | |
References | () http://www.vupen.com/english/advisories/2006/3181 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/28280 - |
Information
Published : 2006-08-14 23:04
Updated : 2025-04-03 01:03
NVD link : CVE-2006-4127
Mitre link : CVE-2006-4127
CVE.ORG link : CVE-2006-4127
JSON object : View
Products Affected
dconnect
- dconnect_daemon
CWE