7.5
CVSSv2

CVE-2006-0460

Published: 17/02/2006 Updated: 20/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple buffer overflows in BomberClone prior to 0.11.6.2 allow remote malicious users to execute arbitrary code via long error messages.

Vulnerable Product Search on Vulmon Subscribe to Product

bomberclone bomberclone 0.11.3

bomberclone bomberclone 0.11.4

bomberclone bomberclone 0.6

bomberclone bomberclone 0.7

bomberclone bomberclone 0.1

bomberclone bomberclone 0.10.0

bomberclone bomberclone 0.4

bomberclone bomberclone 0.5

bomberclone bomberclone 0.9.9

bomberclone bomberclone 0.11.5

bomberclone bomberclone 0.11.6

bomberclone bomberclone 0.8

bomberclone bomberclone 0.9.5

bomberclone bomberclone 0.2

bomberclone bomberclone 0.3

bomberclone bomberclone 0.9.6

bomberclone bomberclone 0.9.7

bomberclone bomberclone 0.9.8

Vendor Advisories

Debian Bug report logs - #382082 CVE-2006-400[56]: Multiple Remote Vulnerabilities in Bomberclone Package: bomberclone; Maintainer for bomberclone is Peter Spiess-Knafl <dev@spiessknaflat>; Source for bomberclone is src:bomberclone (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Tue, 8 Aug ...
Stefan Cornelius of Gentoo Security discovered that bomberclone, a free Bomberman-like game, crashes when receiving overly long error packets, which may also allow remote attackers to execute arbitrary code The old stable distribution (woody) does not contain bomberclone packages For the stable distribution (sarge) these problems have been fixed ...

Exploits

Bomberclone versions less than 01162 remote exploit ...
## # $Id: bomberclone_overflowrb 9179 2010-04-30 08:40:19Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' c ...
/* * bomberclone < 01162 remote exploit * CVE-2006-0460 * 3/14/06 * escazoo@yahoocom */ #include <stdioh> #include <stdlibh> #include <stringh> #include <unistdh> #include <sys/typesh> #include <sys/socketh> #include <netinet/inh> #include <arpa/ineth> /* fork() + bind() port 313 ...