Vulnerabilities > CVE-2006-4611 - Buffer Overflow vulnerability in DSocks Name Variable
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflow in the _tor_resolve function in dsocks.c in dsocks before 1.4 allows remote attackers to execute arbitrary code via unspecified vectors, possibly involving a long node name. This vulnerability is addressed in the following product release: Dsocks, Dsocks, 1.4
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description DSocks 1.3 Name Variable Buffer Overflow Vulnerability. CVE-2006-4611. Dos exploits for multiple platform id EDB-ID:28491 last seen 2016-02-03 modified 2006-09-05 published 2006-09-05 reporter Michael Adams source https://www.exploit-db.com/download/28491/ title DSocks 1.3 Name Variable Buffer Overflow Vulnerability id EDB-ID:2303
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-September/049258.html
- http://secunia.com/advisories/21771
- http://securityreason.com/securityalert/1493
- http://www.monkey.org/~dugsong/dsocks/
- http://www.securityfocus.com/archive/1/445200/100/0/threaded
- http://www.securityfocus.com/bid/19852
- http://www.vupen.com/english/advisories/2006/3526
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28762
- https://www.exploit-db.com/exploits/2303