Vulnerability Details : CVE-2006-2408
Multiple buffer overflows in Raydium before SVN revision 310 allow remote attackers to execute arbitrary code via a large packet when logged via (1) the raydium_log function in log.c or (2) the raydium_console_line_add function in console.c, possibly from a long player name.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2006-2408
Probability of exploitation activity in the next 30 days: 13.68%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-2408
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2006-2408
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-2408
-
http://aluigi.altervista.org/adv/raydiumx-adv.txt
Vendor Advisory
- http://raydium.org/svn.php
-
http://www.vupen.com/english/advisories/2006/1808
Vendor Advisory
- http://www.securityfocus.com/bid/17986
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/26510
- http://securityreason.com/securityalert/900
- http://www.securityfocus.com/archive/1/433930/100/0/threaded
Products affected by CVE-2006-2408
- cpe:2.3:a:raydium:raydium:svn_revision_289:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_290:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_291:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_298:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_299:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_306:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_307:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_287:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_288:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_296:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_297:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_304:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_305:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_285:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_286:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_294:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_295:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_302:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_303:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_283:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_284:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_292:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_293:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_300:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_301:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_308:*:*:*:*:*:*:*
- cpe:2.3:a:raydium:raydium:svn_revision_309:*:*:*:*:*:*:*