Vulnerabilities > CVE-2006-1236 - Unspecified vulnerability in Crossfire 1.9.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Buffer overflow in the SetUp function in socket/request.c in CrossFire 1.9.0 allows remote attackers to execute arbitrary code via a long setup sound command, a different vulnerability than CVE-2006-1010.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | crossfire-server. CVE-2006-1236. Remote exploit for linux platform |
file | exploits/linux/remote/1582.c |
id | EDB-ID:1582 |
last seen | 2016-01-31 |
modified | 2006-03-13 |
platform | linux |
port | 13327 |
published | 2006-03-13 |
reporter | landser |
source | https://www.exploit-db.com/download/1582/ |
title | crossfire-server <= 1.9.0 - SetUp Remote Buffer Overflow Exploit |
type | remote |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-1009.NASL |
description | A buffer overflow has been discovered in the crossfire game which allows remote attackers to execute arbitrary code. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22551 |
published | 2006-10-14 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22551 |
title | Debian DSA-1009-1 : crossfire - buffer overflow |
code |
|
References
- http://cvs.sourceforge.net/viewcvs.py/crossfire/crossfire/socket/request.c?rev=1.86&view=log
- http://cvs.sourceforge.net/viewcvs.py/crossfire/crossfire/socket/request.c?rev=1.86&view=log
- http://packetstormsecurity.com/files/163873/Crossfire-Server-1.0-Buffer-Overflow.html
- http://packetstormsecurity.com/files/163873/Crossfire-Server-1.0-Buffer-Overflow.html
- http://secunia.com/advisories/19237
- http://secunia.com/advisories/19237
- http://secunia.com/advisories/19276
- http://secunia.com/advisories/19276
- http://www.debian.org/security/2006/dsa-1009
- http://www.debian.org/security/2006/dsa-1009
- http://www.osvdb.org/23904
- http://www.osvdb.org/23904
- http://www.securityfocus.com/bid/17093
- http://www.securityfocus.com/bid/17093
- http://www.vupen.com/english/advisories/2006/0951
- http://www.vupen.com/english/advisories/2006/0951
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25252
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25252
- https://www.exploit-db.com/exploits/1582
- https://www.exploit-db.com/exploits/1582