5
CVSSv2

CVE-2006-0048

Published: 26/04/2006 Updated: 20/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Francesco Stablum tcpick 0.2.1 allows remote malicious users to cause a denial of service (segmentation fault) via certain fragmented packets, possibly involving invalid headers and an attacker-controlled payload length. NOTE: this issue might be a buffer overflow or overread.

Vulnerable Product Search on Vulmon Subscribe to Product

francesco stablum tcpick 0.2.1

Vendor Advisories

Debian Bug report logs - #360571 tcpick: Remote DoS [CVE-2006-0048] Package: tcpick; Maintainer for tcpick is Debian Security Tools <team+pkg-security@trackerdebianorg>; Source for tcpick is src:tcpick (PTS, buildd, popcon) Reported by: Martin Pitt <mpitt@debianorg> Date: Mon, 3 Apr 2006 10:48:05 UTC Severity: g ...