Multiple stack-based buffer overflows in the (1) LoadTree, (2) ReadHeader, and (3) LoadXBOXTree functions in the ISO (iso_wincmd) plugin 1.7.3.3 and earlier for Total Commander allow user-assisted remote attackers to execute arbitrary code via a long pathname in an ISO image.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/23599 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/2088 - | |
References | () http://securitytracker.com/id?1017458 - | |
References | () http://vuln.sg/isowincmd173-en.html - Exploit, Vendor Advisory | |
References | () http://vuln.sg/isowincmd173-jp.html - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/455547/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/21820 - | |
References | () http://www.vupen.com/english/advisories/2007/0008 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31180 - |
Information
Published : 2006-12-31 05:00
Updated : 2025-04-09 00:30
NVD link : CVE-2006-6837
Mitre link : CVE-2006-6837
CVE.ORG link : CVE-2006-6837
JSON object : View
Products Affected
sergey_oblomov
- iso_wincmd
CWE