7.5
CVSSv2

CVE-2006-3913

Published: 28/07/2006 Updated: 17/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in Freeciv 2.1.0-beta1 and previous versions, and SVN 15 Jul 2006 and previous versions, allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a (1) negative chunk_length or a (2) large chunk->offset value in a PACKET_PLAYER_ATTRIBUTE_CHUNK packet in the generic_handle_player_attribute_chunk function in common/packets.c, and (3) a large packet->length value in the handle_unit_orders function in server/unithand.c.

Vulnerable Product Search on Vulmon Subscribe to Product

freeciv freeciv 2.1.0_beta1

Vendor Advisories

Debian Bug report logs - #381378 CVE-2006-3913: arbitrary code execution in freeciv Package: freeciv; Maintainer for freeciv is Debian Games Team <pkg-games-devel@listsaliothdebianorg>; Source for freeciv is src:freeciv (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Thu, 3 Aug 2006 23:18 ...
Luigi Auriemma discovered missing boundary checks in freeciv, a clone of the well known Civilisation game, which can be exploited by remote attackers to cause a denial of service (crash) and possibly execute arbitrary code For the stable distribution (sarge) these problems have been fixed in version 201-1sarge2 For the unstable distribution (si ...