Vulnerability Details : CVE-2006-0048
Francesco Stablum tcpick 0.2.1 allows remote attackers to cause a denial of service (segmentation fault) via certain fragmented packets, possibly involving invalid headers and an attacker-controlled payload length. NOTE: this issue might be a buffer overflow or overread.
Vulnerability category: OverflowMemory CorruptionDenial of service
Products affected by CVE-2006-0048
- cpe:2.3:a:francesco_stablum:tcpick:0.2.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-0048
0.83%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 73 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-0048
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2006-0048
-
http://sourceforge.net/mailarchive/forum.php?thread_id=9989610&forum_id=37151
Page not found - SourceForge.net
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/26090
tcpick write.c denial of service CVE-2006-0048 Vulnerability Report
-
http://www.vupen.com/english/advisories/2006/1466
Site en construction
-
http://www.securityfocus.com/bid/17665
Jump to