Vulnerability Details : CVE-2006-3573
Format string vulnerability in the WriteText function in agl_text.cpp in Milan Mimica Sparklet 0.9.4 and earlier allows remote attackers to execute arbitrary code via format string specifiers in a player nickname.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2006-3573
Probability of exploitation activity in the next 30 days: 13.81%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-3573
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
nvd@nist.gov |
CWE ids for CVE-2006-3573
-
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-3573
-
http://aluigi.altervista.org/adv/sparkletfs-adv.txt
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27603
-
http://www.securityfocus.com/bid/18862
-
http://www.vupen.com/english/advisories/2006/2695
Vendor Advisory
- http://www.securityfocus.com/bid/18949
-
http://www.vupen.com/english/advisories/2006/2763
Vendor Advisory
-
http://securitytracker.com/id?1016443
-
http://www.securityfocus.com/archive/1/439475/100/100/threaded
Products affected by CVE-2006-3573
- cpe:2.3:a:milan_mimica:sparklet:*:*:*:*:*:*:*:*